Описание
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2001-0328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4922
- https://support.f5.com/csp/article/K19063943?utm_source=f5support&utm_medium=RSS
- http://secunia.com/advisories/8044
- http://securityreason.com/securityalert/57
- http://www.cert.org/advisories/CA-2001-09.html
- http://www.securityfocus.com/bid/2682
- http://www.securitytracker.com/id/1033181
EPSS
CVE ID
Связанные уязвимости
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
EPSS