TCP RST attack

Mike Tancsa mike at sentex.net
Tue Apr 20 09:56:30 PDT 2004


http://www.uniras.gov.uk/vuls/2004/236929/index.htm


----Quote----
"The impact of this vulnerability varies by vendor and application, but in 
some deployment scenarios it is rated critical. Please see the vendor 
section below for further information. Alternatively contact your vendor 
for product specific information.

If exploited, the vulnerability could allow an attacker to create a Denial 
of Service condition against existing TCP connections, resulting in 
premature session termination. The resulting session termination will 
affect the application layer, the nature and severity of the effects being 
dependent on the application layer protocol. The primary dependency is on 
the duration of the TCP connection, with a further dependency on knowledge 
of the network (IP) addresses of the end points of the TCP connection."

----Quote----
--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike at sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike



More information about the freebsd-security mailing list