CVE编号
CVE-2001-0328利用情况
暂无补丁情况
N/A披露时间
2001-06-27漏洞描述
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
ftp://patches.sgi.com/support/free/security/advisories/20030201-01-P | |
http://secunia.com/advisories/8044 | |
http://securityreason.com/securityalert/57 | |
http://www.cert.org/advisories/CA-2001-09.html | |
http://www.securityfocus.com/bid/2682 | |
http://www.securitytracker.com/id/1033181 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://support.f5.com/csp/article/K19063943?utm_source=f5support&utm_medium=RSS |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...