Openindiana, kernel SunOS 5.11 has a denial of service vulnerability. For the processing of TCP packets with RST or SYN flag set, Openindiana has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the next expected sequence value, just to be within the current receive window, which violates RFC5961. This flaw allows attackers to send multiple random TCP RST/SYN packets to hit the acceptable range of sequence numbers, thereby interrupting normal connections and causing a denial of service attack.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openindiana
Openindiana openindiana Oracle Oracle sunos |
|
Vendors & Products |
Openindiana
Openindiana openindiana Oracle Oracle sunos |
Mon, 29 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Openindiana, kernel SunOS 5.11 has a denial of service vulnerability. For the processing of TCP packets with RST or SYN flag set, Openindiana has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the next expected sequence value, just to be within the current receive window, which violates RFC5961. This flaw allows attackers to send multiple random TCP RST/SYN packets to hit the acceptable range of sequence numbers, thereby interrupting normal connections and causing a denial of service attack. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-29T17:03:28.621Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56233

No data.

Status : Awaiting Analysis
Published: 2025-09-29T17:15:31.710
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-56233

No data.

Updated: 2025-09-30T08:48:24Z