Unrated severityNVD Advisory· Published Jun 27, 2001· Updated Apr 16, 2026
CVE-2001-0328
CVE-2001-0328
Description
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.cert.org/advisories/CA-2001-09.htmlnvdPatchThird Party AdvisoryUS Government Resource
- patches.sgi.com/support/free/security/advisories/20030201-01-Pnvd
- secunia.com/advisories/8044nvd
- securityreason.com/securityalert/57nvd
- www.securityfocus.com/bid/2682nvd
- www.securitytracker.com/id/1033181nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4922nvd
- support.f5.com/csp/article/K19063943nvd
News mentions
0No linked articles in our index yet.