### [CVE-2004-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. ### POC #### Reference - http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml - http://www.kb.cert.org/vuls/id/415294 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 #### Github - https://github.com/auditt7708/rhsecapi - https://github.com/biswajitde/dsm_ips - https://github.com/gabrieljcs/ips-assessment-reports