First published: Wed Sep 10 2008(Updated: )
The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone | =2.0.1 | |
Apple iPhone | =2.0.2 | |
Apple iPhone | =2.0 | |
Apple iPod touch | =2.0.1 | |
Apple iPod touch | =2.0.2 | |
Apple iPod touch | =2.0 | |
Apple iPhone OS | >=2.0.0<=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3612 is rated as a high severity vulnerability due to its potential to allow remote attackers to spoof or hijack TCP connections.
To fix CVE-2008-3612, update the affected Apple iPod touch or iPhone devices to the latest firmware version that addresses this vulnerability.
CVE-2008-3612 affects Apple's iPhone and iPod touch running iPhone OS versions 2.0, 2.0.1, and 2.0.2.
CVE-2008-3612 is a network vulnerability that exploits predictable TCP initial sequence numbers.
Yes, CVE-2008-3612 can be exploited remotely by attackers to hijack or spoof TCP connections.