First published: Sat Jul 07 2001(Updated: )
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =4.3 | |
HP HP-UX | =11.00 | |
HP HP-UX | =11.0.4 | |
HP HP-UX | =11.11 | |
Hp Vvos | =11.04 | |
Linux Linux kernel | =2.4.0 | |
Linux Linux kernel | =2.4.1 | |
Linux Linux kernel | =2.4.2 | |
Linux Linux kernel | =2.4.3 | |
Linux Linux kernel | =2.4.4 | |
Linux Linux kernel | =2.4.5 | |
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp6a | |
NetBSD NetBSD | =1.5 | |
NetBSD NetBSD | =1.5.1 | |
Openbsd Openbsd | =2.8 | |
Openbsd Openbsd | =2.9 | |
Sun SunOS | =5.5.1 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.