The TCP/IP stack in multiple operating systems allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 2000 |
||
microsoft windows 2003 server enterprise |
||
microsoft windows 2003 server standard |
||
microsoft windows 2003 server standard_64-bit |
||
microsoft windows nt 4.0 |
||
microsoft windows 2003 server r2 |
||
microsoft windows 98se |
||
microsoft windows xp |
||
microsoft windows 2003 server datacenter_64-bit |
||
microsoft windows 2003 server enterprise_64-bit |
||
microsoft windows 2003 server web |