Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.securitytracker.com/id/1033881 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-01T16:34:51.942Z
Reserved: 1999-06-07T00:00:00
Link: CVE-1999-0377

No data.

Status : Modified
Published: 1999-02-22T05:00:00.000
Modified: 2024-11-20T23:28:35.670
Link: CVE-1999-0377

No data.