TCP RST attack
Mike Tancsa
mike at sentex.net
Tue Apr 20 09:56:30 PDT 2004
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
----Quote----
"The impact of this vulnerability varies by vendor and application, but in
some deployment scenarios it is rated critical. Please see the vendor
section below for further information. Alternatively contact your vendor
for product specific information.
If exploited, the vulnerability could allow an attacker to create a Denial
of Service condition against existing TCP connections, resulting in
premature session termination. The resulting session termination will
affect the application layer, the nature and severity of the effects being
dependent on the application layer protocol. The primary dependency is on
the duration of the TCP connection, with a further dependency on knowledge
of the network (IP) addresses of the end points of the TCP connection."
----Quote----
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
More information about the freebsd-security
mailing list