CVE-2004-0230

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
References
Link Resource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc Third Party Advisory
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt Third Party Advisory
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt Third Party Advisory
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc Third Party Advisory
http://kb.juniper.net/JSA10638 Third Party Advisory
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440 Permissions Required Third Party Advisory VDB Entry
http://secunia.com/advisories/11458 Permissions Required Third Party Advisory VDB Entry
http://secunia.com/advisories/22341 Permissions Required Third Party Advisory VDB Entry
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml Broken Link
http://www.kb.cert.org/vuls/id/415294 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html Patch Third Party Advisory
http://www.osvdb.org/4030 Broken Link
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183 Exploit Third Party Advisory VDB Entry
http://www.uniras.gov.uk/vuls/2004/236929/index.htm Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-111A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/3983 Permissions Required
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053 Patch Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-08-18 04:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0230

Mitre link : CVE-2004-0230

CVE.ORG link : CVE-2004-0230


JSON object : View

Products Affected

netbsd

  • netbsd

xinuos

  • unixware
  • openserver

openpgp

  • openpgp

juniper

  • junos

oracle

  • solaris

mcafee

  • network_data_loss_prevention