FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freebsd | Freebsd | 4.0 | 4.0 |
Freebsd | Freebsd | 4.1 | 4.1 |
Freebsd | Freebsd | 4.1.1 | 4.1.1 |
Freebsd | Freebsd | 4.2 | 4.2 |
Freebsd | Freebsd | 4.3 | 4.3 |
Freebsd | Freebsd | 4.4 | 4.4 |
Freebsd | Freebsd | 4.5 | 4.5 |
Freebsd | Freebsd | 4.6 | 4.6 |
Freebsd | Freebsd | 4.6.2 | 4.6.2 |
Freebsd | Freebsd | 4.7 | 4.7 |
Freebsd | Freebsd | 4.8 | 4.8 |
Freebsd | Freebsd | 4.9 | 4.9 |
Freebsd | Freebsd | 4.10 | 4.10 |
Freebsd | Freebsd | 4.11 | 4.11 |
Freebsd | Freebsd | 5.0 | 5.0 |
Freebsd | Freebsd | 5.1 | 5.1 |
Freebsd | Freebsd | 5.2 | 5.2 |
Freebsd | Freebsd | 5.2.1 | 5.2.1 |
Freebsd | Freebsd | 5.3 | 5.3 |
Freebsd | Freebsd | 5.4 | 5.4 |