CVE-2004-0230

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

References

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt

ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc

http://kb.juniper.net/JSA10638

http://marc.info/?l=bugtraq&m=108302060014745&w=2

http://marc.info/?l=bugtraq&m=108506952116653&w=2

http://secunia.com/advisories/11440

http://secunia.com/advisories/11458

http://secunia.com/advisories/22341

http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml

http://www.kb.cert.org/vuls/id/415294

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

http://www.osvdb.org/4030

http://www.securityfocus.com/archive/1/449179/100/0/threaded

http://www.securityfocus.com/bid/10183

http://www.uniras.gov.uk/vuls/2004/236929/index.htm

http://www.us-cert.gov/cas/techalerts/TA04-111A.html

http://www.vupen.com/english/advisories/2006/3983

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064

https://exchange.xforce.ibmcloud.com/vulnerabilities/15886

https://kc.mcafee.com/corporate/index?page=content&id=SB10053

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711

Details

Source: MITRE

Published: 2004-08-18

Updated: 2018-10-19

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
108189Solaris 10 (x86) : 150401-10NessusSolaris Local Security Checks
medium
107708Solaris 10 (sparc) : 150400-10NessusSolaris Local Security Checks
medium
97297SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0494-1)NessusSuSE Local Security Checks
critical
97097SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0437-1)NessusSuSE Local Security Checks
critical
96903SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0333-1)NessusSuSE Local Security Checks
critical
92907FreeBSD : FreeBSD -- Denial of Service in TCP packet processing (729c4a9f-6007-11e6-a6c3-14dae9d210b8)NessusFreeBSD Local Security Checks
medium
80937Oracle Solaris Critical Patch Update : jan2015_SRU11_1_15_4_0NessusSolaris Local Security Checks
medium
76506Juniper Junos TCP Packet Processing Remote DoS (JSA10638)NessusJunos Local Security Checks
medium
69872Juniper NSM Servers < 2012.1 Multiple VulnerabilitiesNessusMisc.
high
17781TCP Vulnerabilities in Multiple IOS-Based Cisco ProductsNessusCISCO
medium
22537MS06-064: Vulnerability in TCP/IP IPv6 Could Allow Denial of Service (922819)NessusWindows : Microsoft Bulletins
medium
18028MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066) (uncredentialed check)NessusWindows
high
18023MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066)NessusWindows : Microsoft Bulletins
high
12213TCP/IP Sequence Prediction Blind Reset Spoofing DoSNessusDenial of Service
medium