FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 allows remote malicious users to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
freebsd freebsd 4.5 |
||
freebsd freebsd 4.6 |
||
freebsd freebsd 4.6.2 |
||
freebsd freebsd 4.7 |
||
freebsd freebsd 4.0 |
||
freebsd freebsd 4.1 |
||
freebsd freebsd 4.1.1 |
||
freebsd freebsd 4.10 |
||
freebsd freebsd 5.2 |
||
freebsd freebsd 5.2.1 |
||
freebsd freebsd 5.3 |
||
freebsd freebsd 5.4 |
||
freebsd freebsd 4.2 |
||
freebsd freebsd 4.4 |
||
freebsd freebsd 4.8 |
||
freebsd freebsd 5.0 |
||
freebsd freebsd 4.11 |
||
freebsd freebsd 4.3 |
||
freebsd freebsd 4.9 |
||
freebsd freebsd 5.1 |