Summary: | Multiple vendor TCP/IP implementations could allow a remote attacker to bypass the firewall and establish a connection. A remote attacker could send a TCP packet with different combinations of the SYN, FIN, RST, and ACK flags set to bypass detection and establish a connection. |