TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 95 |
||
microsoft windows nt 4.0 |