Snort Time To Live Fragment Reassembly Security Bypass Weakness

To leverage this issue, attackers can use readily available network utilities.


 

Privacy Statement
Copyright 2010, SecurityFocus