NetScreen has reported that it is possible to predict TCP sequence numbers generated by ScreenOS. This may allow an attacker to inject packets or launch man-in-the-middle attacks against a target network session. For this issue to be exploitable the attacker must be able to access to network session traffic, possibily requiring access to a local network.
NetScreen has reported that it is possible to predict TCP sequence numbers generated by ScreenOS. This may allow an attacker to inject packets or launch man-in-the-middle attacks against a target network session. For this issue to be exploitable the attacker must be able to access to network session traffic, possibily requiring access to a local network.