Multiple TCP implementations could allow remote malicious users to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.4.0 |
||
linux linux kernel 2.4.1 |
||
microsoft windows nt 4.0 |
||
netbsd netbsd 1.5 |
||
netbsd netbsd 1.5.1 |
||
hp hp-ux 11.11 |
||
hp vvos 11.04 |
||
microsoft windows 2000 |
||
sun sunos 5.8 |
||
hp hp-ux 11.0.4 |
||
hp hp-ux 11.00 |
||
linux linux kernel 2.4.5 |
||
sun sunos 5.5.1 |
||
sun sunos 5.7 |
||
freebsd freebsd 4.3 |
||
linux linux kernel 2.4.2 |
||
linux linux kernel 2.4.3 |
||
linux linux kernel 2.4.4 |
||
openbsd openbsd 2.8 |
||
openbsd openbsd 2.9 |