CVE-2001-0328

TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
Configurations

No configuration.

History

07 Nov 2023, 01:55

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K19063943?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K19063943?utm_source=f5support&utm_medium=RSS', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K19063943?utm_source=f5support&amp%3Butm_medium=RSSĀ -

Information

Published : 2001-06-27 04:00

Updated : 2023-12-10 10:17


NVD link : CVE-2001-0328

Mitre link : CVE-2001-0328

CVE.ORG link : CVE-2001-0328


JSON object : View

Products Affected

No product.