TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2001-09-12T04:00:00
Updated: 2024-08-01T17:11:01.969Z
Reserved: 2001-08-31T00:00:00
Link: CVE-1999-1291
Vulnrichment
No data.
NVD
Status : Modified
Published: 1998-10-05T04:00:00.000
Modified: 2024-11-20T23:30:45.927
Link: CVE-1999-1291
Redhat
No data.