Vulnerability Details : CVE-2011-3188
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.
Vulnerability category: Denial of service
Threat overview for CVE-2011-3188
Top countries where our scanners detected CVE-2011-3188
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-3188 3,606
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-3188!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-3188
Probability of exploitation activity in the next 30 days: 1.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-3188
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
NIST |
References for CVE-2011-3188
-
http://www.openwall.com/lists/oss-security/2011/08/23/2
oss-security - Re: CVE request: kernel: change in how tcp seq numbers are generatedMailing List;Patch;Third Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
Mailing List;Patch;Vendor Advisory
-
https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f
crypto: Move md5_transform to lib/md5.c · torvalds/linux@bc0b96b · GitHubPatch;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f
-
https://bugzilla.redhat.com/show_bug.cgi?id=732658
732658 – (CVE-2011-3188) CVE-2011-3188 kernel: net: improve sequence number generationIssue Tracking;Patch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
net: Compute protocol sequence numbers and fragment IDs using MD5. · torvalds/linux@6e5714e · GitHubPatch;Third Party Advisory
-
https://support.f5.com/csp/article/K15301?utm_source=f5support&%3Butm_medium=RSS
Linux kernel TCP ISN vulnerability CVE-2011-3188
-
http://marc.info/?l=bugtraq&m=139447903326211&w=2
'[security bulletin] HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control Server ' - MARCMailing List;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
Products affected by CVE-2011-3188
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Global Traffic ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Global Traffic ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:enterprise_manager:3.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 10.1.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- F5 » Big-ip Wan Optimization ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Wan Optimization ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ModuleVersions from including (>=) 11.0.0 and up to, including, (<=) 11.1.0cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ModuleVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*