Nowadays OSes have protection for this sort of thing. But I'd imagine you could still fingerprint an OS like that. Combine that with TLS, HTTP, etc. specifics and you could narrow it down quite a bit I bet.
[1] https://en.wikipedia.org/wiki/Transmission_Control_Protocol#...