TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
http://www.vupen.com/english/advisories/2006/3983
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.kb.cert.org/vuls/id/415294
http://secunia.com/advisories/22341
http://secunia.com/advisories/11458
http://secunia.com/advisories/11440
http://marc.info/?l=bugtraq&m=108506952116653&w=2