5
CVSSv2

CVE-2001-1244

Published: 07/07/2001 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple TCP implementations could allow remote malicious users to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.4.0

linux linux kernel 2.4.1

microsoft windows nt 4.0

netbsd netbsd 1.5

netbsd netbsd 1.5.1

hp hp-ux 11.11

hp vvos 11.04

microsoft windows 2000

sun sunos 5.8

hp hp-ux 11.0.4

hp hp-ux 11.00

linux linux kernel 2.4.5

sun sunos 5.5.1

sun sunos 5.7

freebsd freebsd 4.3

linux linux kernel 2.4.2

linux linux kernel 2.4.3

linux linux kernel 2.4.4

openbsd openbsd 2.8

openbsd openbsd 2.9

Exploits

/* source: wwwsecurityfocuscom/bid/2997/info A potential denial of service vulnerability exists in several TCP stack implementations TCP has a MSS (maximum segment size) option that is used by a TCP client to announce to a peer the maximum amount of TCP data that can be sent per segment The potential for attacks exists because in many ...