TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the targets last sequence number from the resulting packet, then spoofing a reset to the target.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_95 | Microsoft | * | * |
Windows_nt | Microsoft | 4.0 (including) | 4.0 (including) |