net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
3.13.0-95.1423.19.0-68.76~14.04.14.4.0-36.55~14.04.14.4.0-36.554.4.0-1021.274.4.0-1024.27Exploitability
AV:NAC:HPR:NUI:NScope
S:UImpact
C:NI:LA:LCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L