CVE-2005-0356
Published: 31 May 2005
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
Priority
Status
Package | Release | Status |
---|---|---|
kfreebsd-5 Launchpad, Ubuntu, Debian |
dapper |
Released
(5.4-12)
|
edgy |
Released
(5.4-12)
|
|
feisty |
Released
(5.4-12)
|
|
upstream |
Needs triage
|