The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2000-04-18T04:00:00
Updated: 2005-11-02T10:00:00
Reserved: 2000-02-02T00:00:00
Link: CVE-2000-0095
JSON object: View
NVD Information
Status : Analyzed
Published: 2000-01-24T05:00:00.000
Modified: 2008-09-10T19:02:54.180
Link: CVE-2000-0095
JSON object: View
Redhat Information
No data.
CWE