TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
- http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
- http://www.kb.cert.org/vuls/id/415294
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
- https://kc.mcafee.com/corporate/index?page=content&id=SB10053
- https://github.com/RedHatProductSecurity/rhsecapi
- https://github.com/auditt7708/rhsecapi
- https://github.com/biswajitde/dsm_ips
- https://github.com/gabrieljcs/ips-assessment-reports