#VU51432 Use of insufficiently random values in NetBSD
Published: March 12, 2021
NetBSD
NetBSD Foundation, Inc
Description
The vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to IP ID randomization is not enabled by default for IPv4 and IPv6 fragments and TCP ISS random generation has an information leak. A remote attacker can analyze packets received from the system and use the obtained information to spoof packets.