CVE-2001-1244
Published Jul 7, 2001
Last updated 6 years ago
Overview
- Description
- Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F" }, { "criteria": "cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D462D6F-EB68-4E31-87FD-D918F5DEF3FB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE4E91DD-FA6B-4735-A07C-0A88BADCAFCC" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A" }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759" }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224" } ], "operator": "OR" } ] } ]