info
discussion
exploit
solution
references
BSD PMTUD SYN-ACK Packet Fragmentation Fingerprinting Vulnerability
No exploit is required. The attacker must, however, be adept at monitoring and analyzing low level network traffic.
Privacy Statement
Copyright 2010, SecurityFocus