The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection.
References
Link Resource
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html Mailing List Vendor Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html Mailing List Vendor Advisory
http://secunia.com/advisories/31823 Broken Link Vendor Advisory
http://secunia.com/advisories/31900 Broken Link Vendor Advisory
http://support.apple.com/kb/HT3026 Vendor Advisory
http://support.apple.com/kb/HT3129 Vendor Advisory
http://www.securityfocus.com/bid/31092 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020848 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2525 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2008/2558 Broken Link Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2008-09-10T16:00:00

Updated: 2008-09-17T09:00:00

Reserved: 2008-08-12T00:00:00


Link: CVE-2008-3612

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2008-09-11T01:13:09.227

Modified: 2024-02-14T16:07:54.400


Link: CVE-2008-3612

JSON object: View

cve-icon Redhat Information

No data.

CWE