Описание
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | unfixed | package | ||
linux-2.6 | removed | package | ||
linux-2.6.24 | removed | package |
Примечания
the attack works with a certain non-negligible probability, but even
when successful, it only causes a TCP disconnect, which will (in most
circumstances) be reestablished right away, causing essentially no impact
EPSS
Связанные уязвимости
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
Уязвимость встроенного программного обеспечения станков с числовым программным управлением FANUC 32i, позволяющая нарушителю вызвать отказ в обслуживании
EPSS