New Search

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets which allows remote attackers to conduct an Idle Scan (nmap -sI) attack which bypasses intended protections against such attacks.

oval:org.mitre.oval:def:10317

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets which allows remote attackers to conduct an Idle Scan (nmap -sI) attack which bypasses intended protections against such attacks.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Oracle Linux 4
  • CentOS Linux 4
  • Red Hat Enterprise Linux 3
  • CentOS Linux 3
  • Red Hat Enterprise Linux 4
Class:
vulnerability
Reference(s):
  • CVE-2006-1242
Product(s):