TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/10789 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/1383 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2001-09-12T04:00:00
Updated: 2017-12-18T21:57:01
Reserved: 2001-08-31T00:00:00
Link: CVE-1999-1291
JSON object: View
NVD Information
Status : Modified
Published: 1998-10-05T04:00:00.000
Modified: 2017-12-19T02:29:07.470
Link: CVE-1999-1291
JSON object: View
Redhat Information
No data.
CWE