Total vulnerabilities in the database
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Software | From | Fixed in |
---|---|---|
microsoft / windows_nt | 4.0 | 4.0.x |
openbsd / openbsd | 2.8 | 2.8.x |
hp / hp-ux | 11.11 | 11.11.x |
microsoft / windows_nt | 4.0-sp2 | 4.0-sp2.x |
netbsd / netbsd | 1.5 | 1.5.x |
openbsd / openbsd | 2.9 | 2.9.x |
sun / sunos | 5.7 | 5.7.x |
sun / sunos | 5.8 | 5.8.x |
microsoft / windows_2000 | - | - |
microsoft / windows_nt | 4.0-sp1 | 4.0-sp1.x |
microsoft / windows_nt | 4.0-sp4 | 4.0-sp4.x |
hp / hp-ux | 11.00 | 11.00.x |
microsoft / windows_nt | 4.0-sp6a | 4.0-sp6a.x |
netbsd / netbsd | 1.5.1 | 1.5.1.x |
linux / linux_kernel | 2.4.0 | 2.4.0.x |
linux / linux_kernel | 2.4.2 | 2.4.2.x |
hp / hp-ux | 11.0.4 | 11.0.4.x |
microsoft / windows_nt | 4.0-sp6 | 4.0-sp6.x |
hp / vvos | 11.04 | 11.04.x |
linux / linux_kernel | 2.4.5 | 2.4.5.x |
sun / sunos | 5.5.1 | 5.5.1.x |
freebsd / freebsd | 4.3 | 4.3.x |
linux / linux_kernel | 2.4.3 | 2.4.3.x |
linux / linux_kernel | 2.4.1 | 2.4.1.x |
linux / linux_kernel | 2.4.4 | 2.4.4.x |
microsoft / windows_nt | 4.0-sp3 | 4.0-sp3.x |
microsoft / windows_nt | 4.0-sp5 | 4.0-sp5.x |