6.5 Medium
AI Score
Confidence
Low
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.051 Low
EPSS
Percentile
92.7%
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
blog.robertlee.name/2008/10/conjecture-speculation.html
insecure.org/stf/tcp-dos-attack-explained.html
lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
www.mandriva.com/security/advisories?name=MDVSA-2013:150
www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
www.outpost24.com/news/news-2008-10-02.html
www.us-cert.gov/cas/techalerts/TA09-251A.html
docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
marc.info/?l=bugtraq&m=125856010926699&w=2
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html