Bugzilla – Bug 954947
VUL-1: CVE-2001-0328: kernel: random increments for TCP initial sequence numbers
Last modified: 2015-11-13 12:21:59 UTC
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. ftp://patches.sgi.com/support/free/security/advisories/20030201-01-P http://www.cert.org/advisories/CA-2001-09.html CA-2001-09 http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:4922 oval:org.mitre.oval:def:4922 http://secunia.com/advisories/8044 http://securityreason.com/securityalert/57
http://www.cert.org/historical/advisories/CA-2001-09.cfm has this statement: Linux The Linux kernel has used a variant of RFC1948 by default since 1996. Please see: http://lxr.linux.no/source/drivers/char/ChangeLog#L258 http://lxr.linux.no/source/drivers/char/random.c#L1855 so it is fixed since 1996 (20 years).