Description
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:14:07.389Z
Reserved: 2001-04-23T00:00:00.000Z
Link: CVE-2001-0328
No data.
Status : Modified
Published: 2001-06-27T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2001-0328
OpenCVE Enrichment
No data.
Weaknesses