{"id":1003,"date":"2023-06-16T22:25:10","date_gmt":"2023-06-16T20:25:10","guid":{"rendered":"http:\/\/blog.pi3.com.pl\/?p=1003"},"modified":"2023-06-16T22:25:10","modified_gmt":"2023-06-16T20:25:10","slug":"cve-2023-34367","status":"publish","type":"post","link":"https:\/\/blog.pi3.com.pl\/?p=1003","title":{"rendered":"CVE-2023-34367"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Blind TCP\/IP hijacking is still alive! After 13 years, Windows 7\/XP\/2K\/9x\u00a0(and not only) full blind TCP\/IP hijacking\u00a0bug finally got an allocated CVE-2023-34367 (thanks to MITRE). Interestingly, The Pwnie Awards nomination for this research and the published write-up + PoC didn&#8217;t help to get it sooner \ud83d\ude09<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>More information about that bug I described in my blogpost on January 2021:<br><a rel=\"noreferrer noopener\" href=\"http:\/\/blog.pi3.com.pl\/?p=850\" target=\"_blank\">http:\/\/blog.pi3.com.pl\/?p=850<\/a><\/p>\n\n\n\n<p>More information about CVE is available on the MITRE website:<br><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-34367\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-34367<\/a><\/p>\n\n\n\n<p>Information on The Pwnie Awards nomination for this bug and research can be found here:<br><a rel=\"noreferrer noopener\" href=\"https:\/\/pwnies.com\/windows-7-blind-tcp-ip-hijacking\/\" target=\"_blank\">https:\/\/pwnies.com\/windows-7-blind-tcp-ip-hijacking\/<\/a><\/p>\n\n\n\n<p>Port Swigger also covered that bug in their article here:<br><a href=\"https:\/\/portswigger.net\/daily-swig\/blind-tcp-ip-hijacking-is-resurrected-for-windows-7\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/portswigger.net\/daily-swig\/blind-tcp-ip-hijacking-is-resurrected-for-windows-7<\/a><\/p>\n\n\n\n<p>After 13 years we can finally use the CVE to identify this important (at least from my perspective) vulnerability!<\/p>\n\n\n\n<p>Thanks,<br>Adam<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blind TCP\/IP hijacking is still alive! After 13 years, Windows 7\/XP\/2K\/9x\u00a0(and not only) full blind TCP\/IP hijacking\u00a0bug finally got an allocated CVE-2023-34367 (thanks to MITRE). Interestingly, The Pwnie Awards nomination for this research and the published write-up + PoC didn&#8217;t help to get it sooner \ud83d\ude09<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,5,1],"tags":[],"class_list":["post-1003","post","type-post","status-publish","format-standard","hentry","category-bughunt","category-exploiting","category-o-wszystkim-i-o-niczym"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/1003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1003"}],"version-history":[{"count":1,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/1003\/revisions"}],"predecessor-version":[{"id":1004,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/1003\/revisions\/1004"}],"wp:attachment":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}