Total vulnerabilities in the database
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.
Software | From | Fixed in |
---|---|---|
hp / hp-ux | 10.30 | 10.30.x |
hp / hp-ux | 11.00 | 11.00.x |