In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 2.0.30 (including) | 2.0.30 (including) |
Linux_kernel | Linux | 2.0.35 (including) | 2.0.35 (including) |
Linux_kernel | Linux | 2.0.36 (including) | 2.0.36 (including) |
Linux_kernel | Linux | 2.0.37 (including) | 2.0.37 (including) |