1999-09-29 04:00:00
mitre
PUBLISHED
In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.