You are using IPv4 from 216.73.217.61
Main Headlines
New IPv6 Book "IPv6 for All"
Enable project releases Mobility publication
The Choice: IPv4 Exhaustion or Transition to IPv6
Consulintel: logos
 
SEARCH
Are you a...?
> ISP
Keep informed, visit our
Tell us your thoughts
on IPv6 > POLL
Looking for an
IPv6 Task Force? >
Questions? > FAQS
Jump to PROJECTS
Next EVENTS
000 members
036 guests
LOGIN 
Password 
Not member yet?
Get "extras". Register
Search Bar Plug-in
Firefox      IE7
Other News
(May 01, 2004)
(Apr 29, 2004)
(Apr 28, 2004)
(Apr 28, 2004)
(Apr 28, 2004)
(Apr 28, 2004)
(Apr 28, 2004)
(Apr 27, 2004)
(Apr 27, 2004)
(Apr 27, 2004)
(Apr 27, 2004)
(Apr 27, 2004)
InterNiche Technologies Posts Fixes for TCP/IP Denial of Service Scenarios
Posted by: Jordi on Wednesday, April 28, 2004 - 09:43 PM
(221142 Reads) comments? Send this story to a friend Printer friendly page
InterNiche Technologies, Inc., a major supplier of Internet and network security protocols stacks used worldwide by network devices and embedded applications OEMs, today announced that they have updated their NicheStack(TM) and NicheLite(TM) stacks to address the TCP Reset (RST) and SYN Attack vulnerabilities that were disclosed today by the United Kingdom's National Infrastructure and Security Coordination Centre.
"InterNiche has been working with the NISCC since first alerted to this vulnerability and on April 8th we informed NISCC that we had examined the scenario, had tested a patch and posted an updated version of our NicheStack IPv4, NicheStack IPv4/IPv6 Dual, and our NicheLite protocol stacks," said Brian Ramsey, Vice President of Marketing at InterNiche.

Information from TMCnet, eMediaWire, LinuxElectrons and BusinessWire.