TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
Metrics
Affected Vendors & Products
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published: 2001-05-24T04:00:00
Updated: 2024-08-08T04:14:07.389Z
Reserved: 2001-04-23T00:00:00
Link: CVE-2001-0328
No data.
Status : Deferred
Published: 2001-06-27T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2001-0328