oval
via4
|
accepted | 2013-09-02T04:05:45.550-04:00 | class | vulnerability | contributors | name | Matthew Burton | organization | The MITRE Corporation |
name | John Hoyland | organization | Centennial Software |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Dragos Prisaca | organization | G2, Inc. |
| description | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. | family | windows | id | oval:org.mitre.oval:def:2689 | status | accepted | submitted | 2005-08-18T04:00:00.000-04:00 | title | Server 2003 Large Window Size TCP RST Denial of Service | version | 43 |
accepted | 2011-05-09T04:01:29.162-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
| definition_extensions | comment | Microsoft Windows XP SP1 (32-bit) is installed | oval | oval:org.mitre.oval:def:1 |
comment | Microsoft Windows XP SP2 or later is installed | oval | oval:org.mitre.oval:def:521 |
comment | Microsoft Windows XP SP1 (64-bit) is installed | oval | oval:org.mitre.oval:def:480 |
comment | Microsoft Windows Server 2003 (x86) Gold is installed | oval | oval:org.mitre.oval:def:165 |
comment | Microsoft Windows Server 2003 SP1 (x86) is installed | oval | oval:org.mitre.oval:def:565 |
| description | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. | family | windows | id | oval:org.mitre.oval:def:270 | status | accepted | submitted | 2006-10-11T05:29:41 | title | TCP Connection Reset Vulnerability | version | 45 |
accepted | 2011-05-16T04:02:48.829-04:00 | class | vulnerability | contributors | name | Matthew Burton | organization | The MITRE Corporation |
name | John Hoyland | organization | Centennial Software |
name | Dragos Prisaca | organization | Gideon Technologies, Inc. |
name | Brendan Miles | organization | The MITRE Corporation |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. | family | windows | id | oval:org.mitre.oval:def:3508 | status | accepted | submitted | 2005-08-18T04:00:00.000-04:00 | title | WinXP Large Window Size TCP RST Denial of Service | version | 44 |
accepted | 2011-05-16T04:03:04.644-04:00 | class | vulnerability | contributors | name | Matthew Burton | organization | The MITRE Corporation |
name | John Hoyland | organization | Centennial Software |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. | family | windows | id | oval:org.mitre.oval:def:4791 | status | accepted | submitted | 2005-04-22T12:00:00.000-04:00 | title | Win2k Large Window Size TCP RST Denial of Service | version | 41 |
accepted | 2008-09-08T04:00:38.111-04:00 | class | vulnerability | contributors | name | Yuzheng Zhou | organization | Hewlett-Packard |
| description | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. | family | ios | id | oval:org.mitre.oval:def:5711 | status | accepted | submitted | 2008-05-26T11:06:36.000-04:00 | title | Cisco Systems Spoofed TCP Reset and SYN Denial of Service Vulnerability | version | 3 |
|