TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
References
Configurations
No configuration.
Information
Published : 2001-06-26 21:00
Updated : 2017-10-18 18:29
NVD link : CVE-2001-0328
Mitre link : CVE-2001-0328
JSON object : View
CWE
Products Affected
No product.


