Linux Kernel IP ID Information Disclosure Weakness

To exploit this issue, an attacker would use common network utilities such as 'nmap', 'hping', and so on.


 

Privacy Statement
Copyright 2010, SecurityFocus