First published: Wed Dec 31 2003(Updated: )
The implementation of SYN cookies (syncookies) in FreeBSD 4.5 through 5.0-RELEASE-p3 uses only 32-bit internal keys when generating syncookies, which makes it easier for remote attackers to conduct brute force ISN guessing attacks and spoof legitimate traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.5-release | |
FreeBSD Kernel | =4.6-release | |
FreeBSD Kernel | =4.7-release | |
FreeBSD Kernel | =4.7-stable | |
FreeBSD Kernel | =5.0-release | |
FreeBSD Kernel | =5.0-release | |
FreeBSD Kernel | =4.6-release | |
FreeBSD Kernel | =4.7-stable | |
FreeBSD Kernel | =4.5-release | |
FreeBSD Kernel | =4.7-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1230 has a moderate severity level due to its potential to allow brute force ISN guessing attacks.
To fix CVE-2003-1230, consider upgrading to a newer version of FreeBSD where this vulnerability is addressed.
CVE-2003-1230 affects FreeBSD versions 4.5 through 5.0-RELEASE-p3.
CVE-2003-1230 is associated with ISN guessing attacks that enable remote spoofing of legitimate traffic.
CVE-2003-1230 is caused by the use of 32-bit internal keys in the implementation of SYN cookies in affected FreeBSD versions.