Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x28w-5rvr-6hvm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

EPSS

Процентиль: 88%
0.0373
Низкий

Связанные уязвимости

nvd
около 11 лет назад

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

debian
около 11 лет назад

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly ...

EPSS

Процентиль: 88%
0.0373
Низкий