Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 20 Apr 2004 12:57:25 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   TCP RST attack
Message-ID:  <6.0.3.0.0.20040420125557.06b10d48@209.112.4.2>

next in thread | raw e-mail | index | archive | help

http://www.uniras.gov.uk/vuls/2004/236929/index.htm


----Quote----
"The impact of this vulnerability varies by vendor and application, but in 
some deployment scenarios it is rated critical. Please see the vendor 
section below for further information. Alternatively contact your vendor 
for product specific information.

If exploited, the vulnerability could allow an attacker to create a Denial 
of Service condition against existing TCP connections, resulting in 
premature session termination. The resulting session termination will 
affect the application layer, the nature and severity of the effects being 
dependent on the application layer protocol. The primary dependency is on 
the duration of the TCP connection, with a further dependency on knowledge 
of the network (IP) addresses of the end points of the TCP connection."

----Quote----
--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.3.0.0.20040420125557.06b10d48>