Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7250

Опубликовано: 12 дек. 2014
Источник: debian
EPSS Низкий

Описание

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-8undeterminedpackage
kfreebsd-8end-of-lifewheezypackage
kfreebsd-9undeterminedpackage
kfreebsd-9end-of-lifewheezypackage
kfreebsd-10undeterminedpackage
kfreebsd-10end-of-lifebusterpackage
kfreebsd-10end-of-lifejessiepackage

EPSS

Процентиль: 88%
0.0373
Низкий

Связанные уязвимости

nvd
около 11 лет назад

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

github
больше 3 лет назад

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

EPSS

Процентиль: 88%
0.0373
Низкий