CVE-2025-56233
BaseFortify
Publication date: 2025-09-29
Last updated on: 2025-10-28
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openindiana | kernel | 5.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Openindiana kernel SunOS 5.11 where the system accepts a wide range of TCP sequence numbers for packets with RST or SYN flags set, instead of requiring an exact match to the next expected sequence number as specified by RFC5961. Attackers can exploit this by sending multiple random TCP RST or SYN packets that fall within the acceptable sequence number range, causing interruptions in normal TCP connections and resulting in a denial of service.
How can this vulnerability impact me? :
The vulnerability can be exploited by attackers to disrupt normal TCP connections by sending crafted TCP RST or SYN packets that fall within the acceptable sequence number range. This leads to denial of service attacks, causing interruptions or unavailability of network services relying on TCP connections.