PAWS Vulnerability: Denial of Service via Spoofed Packets with Large Timer Value
CVE-2005-0356 · MEDIUM Severity
AV:N/AC:L/AU:N/C:N/I:N/A:P
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
Learn more about our Aws Audit.