Computer Security
[EN] securityvulns.ru no-pyccku


Cisco PIX TCP connection DoS
updated since 22.11.2005
Published:07.03.2006
Source:
SecurityVulns ID:5473
Type:remote
Threat Level:
5/10
Description:Packets from the same hosts are blocked for few minutes if packet with invalid checksum, or with 1 byte data or of predefined TTL is received.
Affected:CISCO : PIX 6.3
Original documentdocumentKonstantin Gavrilenko, [Full-disclosure] Cisco PIX embryonic state machine TTL(n-1) DoS (07.03.2006)
 documentKonstantin Gavrilenko, [Full-disclosure] Cisco PIX embryonic state machine 1b data DoS (07.03.2006)
 documentCISCO, [Full-disclosure] Cisco PIX embryonic state machine TTL(n-1) DoS and Cisco PIX embryonic state machine 1b data DoS (07.03.2006)
 documentCISCO, [Full-disclosure] Cisco PIX TCP Connection Prevention (22.11.2005)
 documentKonstantin Gavrilenko, [Full-disclosure] Cisco PIX TCP Connection Prevention (22.11.2005)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod