Описание
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.0373
Низкий
5 Medium
CVSS2
Дефекты
CWE-399
Связанные уязвимости
debian
около 11 лет назад
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly ...
github
больше 3 лет назад
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
EPSS
Процентиль: 88%
0.0373
Низкий
5 Medium
CVSS2
Дефекты
CWE-399