TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
Max CVSS
5.0
EPSS Score
0.27%
Published
2004-08-18
Updated
2018-10-19
OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
Max CVSS
5.0
EPSS Score
2.33%
Published
2004-11-23
Updated
2017-10-10
Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.
Max CVSS
2.1
EPSS Score
0.04%
Published
2004-12-16
Updated
2017-07-11
3 vulnerabilities found