TCP, when using a large Window Size, makes it easier for remote malicious users to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle solaris 11 |
||
oracle solaris 10 |
||
openpgp openpgp 2.6.2 |
||
mcafee network data loss prevention 9.2.1 |
||
mcafee network data loss prevention 9.2.0 |
||
mcafee network data loss prevention |
||
mcafee network data loss prevention 9.2.2 |
||
netbsd netbsd 1.5.2 |
||
netbsd netbsd 1.5.3 |
||
netbsd netbsd 1.6 |
||
netbsd netbsd 1.6.1 |
||
netbsd netbsd 1.6.2 |
||
netbsd netbsd 2.0 |
||
netbsd netbsd 1.5 |
||
netbsd netbsd 1.5.1 |
||
xinuos openserver 5.0.6 |
||
xinuos openserver 5.0.7 |
||
juniper junos |
||
xinuos unixware 7.1.1 |
||
xinuos unixware 7.1.3 |