CVE-2011-3188

CRITICAL
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc0b96b54a21246e377122d54569eef71cec535f

http://marc.info/?l=bugtraq&m=139447903326211&w=2

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

http://www.openwall.com/lists/oss-security/2011/08/23/2

https://bugzilla.redhat.com/show_bug.cgi?id=732658

https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f

https://support.f5.com/csp/article/K15301?utm_source=f5support&utm_medium=RSS

Details

Source: MITRE

Published: 2012-05-24

Updated: 2020-07-29

Risk Information

CVSS v2

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Impact Score: 5.2

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:* versions from 6.0.0 to 6.4.0 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 10.1.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 10.1.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 10.0.0 to 10.2.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.0.0 to 11.1.0 (inclusive)

cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* versions from 2.1.0 to 2.3.0 (inclusive)

cpe:2.3:a:f5:enterprise_manager:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:* versions from 6.0.0 to 6.1.0 (inclusive)

cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*

Tenable Plugins

View all (34 total)

IDNameProductFamilySeverity
89038VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check)NessusMisc.
high
79280RHEL 5 : rhev-hypervisor (RHSA-2011:1408)NessusRed Hat Local Security Checks
medium
78170F5 Networks BIG-IP : Linux kernel TCP ISN vulnerability (K15301)NessusF5 Networks Local Security Checks
critical
76635RHEL 6 : MRG (RHSA-2012:0010)NessusRed Hat Local Security Checks
critical
69873Juniper NSM Linux Kernel TCP Sequence Number Generation Issue (PSN-2012-08-688)NessusMisc.
medium
69585Amazon Linux AMI : kernel (ALAS-2011-26)NessusAmazon Linux Local Security Checks
critical
69575Amazon Linux AMI : kernel (ALAS-2011-16)NessusAmazon Linux Local Security Checks
critical
68424Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2011-2033)NessusOracle Linux Local Security Checks
critical
68393Oracle Linux 6 : kernel (ELSA-2011-1465)NessusOracle Linux Local Security Checks
critical
68375Oracle Linux 5 : kernel (ELSA-2011-1386)NessusOracle Linux Local Security Checks
critical
64005RHEL 5 : kernel (RHSA-2011:1419)NessusRed Hat Local Security Checks
medium
61747VMSA-2012-0013 : VMware vSphere and vCOps updates to third-party librariesNessusVMware ESX Local Security Checks
critical
61179Scientific Linux Security Update : kernel on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
critical
61162Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
57297SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5493 / 5510 / 5511)NessusSuSE Local Security Checks
high
56927RHEL 6 : kernel (RHSA-2011:1465)NessusRed Hat Local Security Checks
critical
56768Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1256-1)NessusUbuntu Local Security Checks
critical
56747Ubuntu 10.04 LTS : linux vulnerabilities (USN-1253-1)NessusUbuntu Local Security Checks
critical
56645Ubuntu 11.04 : linux vulnerabilities (USN-1246-1)NessusUbuntu Local Security Checks
critical
56644Ubuntu 10.10 : linux-mvl-dove vulnerabilities (USN-1245-1)NessusUbuntu Local Security Checks
critical
56642Ubuntu 10.10 : linux vulnerabilities (USN-1243-1)NessusUbuntu Local Security Checks
medium
56641Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1242-1)NessusUbuntu Local Security Checks
medium
56640USN-1241-1 : linux-fsl-imx51 vulnerabilitiesNessusUbuntu Local Security Checks
critical
56639Ubuntu 10.04 LTS : linux-mvl-dove vulnerabilities (USN-1240-1)NessusUbuntu Local Security Checks
critical
56638Ubuntu 10.04 LTS : linux-ec2 vulnerabilities (USN-1239-1)NessusUbuntu Local Security Checks
critical
56583Ubuntu 8.04 LTS : linux vulnerabilities (USN-1236-1)NessusUbuntu Local Security Checks
medium
56577RHEL 5 : kernel (RHSA-2011:1386)NessusRed Hat Local Security Checks
critical
56569CentOS 5 : kernel (CESA-2011:1386)NessusCentOS Local Security Checks
critical
56479USN-1228-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
critical
56345USN-1220-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
critical
56285Debian DSA-2310-1 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
medium
56283Linux Kernel TCP Sequence Number Generation Security WeaknessNessusGeneral
medium
56130Debian DSA-2303-2 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
critical
801510CentOS RHSA-2011-1386 Security CheckLog Correlation EngineGeneric
high