BSD PMTUD SYN-ACK Packet Fragmentation Fingerprinting Vulnerability

No exploit is required. The attacker must, however, be adept at monitoring and analyzing low level network traffic.


 

Privacy Statement
Copyright 2010, SecurityFocus