First published: Tue Jul 05 2005(Updated: )
FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =4.1 | |
FreeBSD FreeBSD | =4.1.1 | |
FreeBSD FreeBSD | =4.2 | |
FreeBSD FreeBSD | =4.3 | |
FreeBSD FreeBSD | =4.4 | |
FreeBSD FreeBSD | =4.5 | |
FreeBSD FreeBSD | =4.6 | |
FreeBSD FreeBSD | =4.6.2 | |
FreeBSD FreeBSD | =4.7 | |
FreeBSD FreeBSD | =4.8 | |
FreeBSD FreeBSD | =4.9 | |
FreeBSD FreeBSD | =4.10 | |
FreeBSD FreeBSD | =4.11 | |
FreeBSD FreeBSD | =5.0 | |
FreeBSD FreeBSD | =5.1 | |
FreeBSD FreeBSD | =5.2 | |
FreeBSD FreeBSD | =5.2.1 | |
FreeBSD FreeBSD | =5.3 | |
FreeBSD FreeBSD | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.