TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
References
Configurations
No configuration.
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20030201-01-P - | |
References | () http://secunia.com/advisories/8044 - | |
References | () http://securityreason.com/securityalert/57 - | |
References | () http://www.cert.org/advisories/CA-2001-09.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/2682 - | |
References | () http://www.securitytracker.com/id/1033181 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4922 - | |
References | () https://support.f5.com/csp/article/K19063943?utm_source=f5support&%3Butm_medium=RSS - |
07 Nov 2023, 01:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2001-06-27 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0328
Mitre link : CVE-2001-0328
CVE.ORG link : CVE-2001-0328
JSON object : View
Products Affected
No product.
CWE