Openindiana, kernel SunOS 5.11 has a denial of service vulnerability. For the processing of TCP packets with RST or SYN flag set, Openindiana has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the next expected sequence value, just to be within the current receive window, which violates RFC5961. This flaw allows attackers to send multiple random TCP RST/SYN packets to hit the acceptable range of sequence numbers, thereby interrupting normal connections and causing a denial of service attack.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 29 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Openindiana, kernel SunOS 5.11 has a denial of service vulnerability. For the processing of TCP packets with RST or SYN flag set, Openindiana has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the next expected sequence value, just to be within the current receive window, which violates RFC5961. This flaw allows attackers to send multiple random TCP RST/SYN packets to hit the acceptable range of sequence numbers, thereby interrupting normal connections and causing a denial of service attack. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-29T17:03:28.621Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56233

No data.

Status : Awaiting Analysis
Published: 2025-09-29T17:15:31.710
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-56233

No data.

No data.