The general attack outline is as follows:
If the authentication protocol is not carefully designed, the target will accept that response as valid, thereby leaving the attacker with one fully authenticated channel connection (the other one is simply abandoned).
Some of the most common solutions to this attack are described below:
Computer Networks by Andrew S. Tanenbaum, 4th edition, ISBN 0-13-038488-7, pages 787-790. /wiki/Andrew_S._Tanenbaum ↩
Ross J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edition, page 21, ISBN 0-471-38922-6 /wiki/Ross_J._Anderson ↩