cve/2008/CVE-2008-4609.md

26 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2008-4609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4609)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
### POC
#### Reference
- http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
- http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2008-4609
2024-08-06 19:19:10 +00:00
- https://github.com/comeillfoo/netverif
2024-05-26 14:27:05 +02:00
- https://github.com/marcelki/sockstress
- https://github.com/mrclki/sockstress