Skip to navigation

CVE Database

CVE-2011-3188

Impact: Moderate
Public: 2011-08-07
Bugzilla: 732658: CVE-2011-3188 kernel: net: improve sequence number generation
IAVA: 2012-A-0153

Details

The MITRE CVE dictionary describes this issue as:

The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.

Find out more about CVE-2011-3188 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.

CVSS v2 metrics

Base Score: 5.8
Base Metrics: AV:N/AC:M/Au:N/C:N/I:P/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2012:0010 January 10, 2012
RHEV Hypervisor for RHEL-5 (rhev-hypervisor) RHSA-2011:1408 October 26, 2011
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2011:1419 November 01, 2011
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:1386 October 20, 2011
Red Hat Enterprise Linux version 6 (kernel) RHSA-2011:1465 November 22, 2011

External References

Acknowledgements

Red Hat would like to thank Dan Kaminsky for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.