FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freebsd | Freebsd | 4.0 (including) | 4.0 (including) |
Freebsd | Freebsd | 4.1 (including) | 4.1 (including) |
Freebsd | Freebsd | 4.1.1 (including) | 4.1.1 (including) |
Freebsd | Freebsd | 4.2 (including) | 4.2 (including) |
Freebsd | Freebsd | 4.3 (including) | 4.3 (including) |
Freebsd | Freebsd | 4.4 (including) | 4.4 (including) |
Freebsd | Freebsd | 4.5 (including) | 4.5 (including) |
Freebsd | Freebsd | 4.6 (including) | 4.6 (including) |
Freebsd | Freebsd | 4.6.2 (including) | 4.6.2 (including) |
Freebsd | Freebsd | 4.7 (including) | 4.7 (including) |
Freebsd | Freebsd | 4.8 (including) | 4.8 (including) |
Freebsd | Freebsd | 4.9 (including) | 4.9 (including) |
Freebsd | Freebsd | 4.10 (including) | 4.10 (including) |
Freebsd | Freebsd | 4.11 (including) | 4.11 (including) |
Freebsd | Freebsd | 5.0 (including) | 5.0 (including) |
Freebsd | Freebsd | 5.1 (including) | 5.1 (including) |
Freebsd | Freebsd | 5.2 (including) | 5.2 (including) |
Freebsd | Freebsd | 5.2.1 (including) | 5.2.1 (including) |
Freebsd | Freebsd | 5.3 (including) | 5.3 (including) |
Freebsd | Freebsd | 5.4 (including) | 5.4 (including) |