2024-12-08 03:06:42 +00:00

612 lines
19 KiB
JSON

{
"id": "CVE-2004-0230",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-18T04:00:00.000",
"lastModified": "2024-11-20T23:48:03.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP."
},
{
"lang": "es",
"value": "TCP, cuando se usa un tama\u00f1o de ventana de transmisi\u00f3n grande, hace m\u00e1s f\u00e1cil a atacantes remotos adivinar n\u00fameros de secuencia y causar una denegaci\u00f3n de servicio (p\u00e9rdida de la conexi\u00f3n) en conexiones TCP persistentes inyectando repetidamente un paquete TCP RST, especialmente en protocolos que usan conexiones de vida larga, como BGP."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7DB4DC-5369-4087-B055-F1B1BFB50812"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.6",
"matchCriteriaId": "F205B07D-D1C9-4761-9C63-D7BE5E2C73CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40679A45-CE96-4F49-B552-8FB5B6AD493F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99FB50CA-9C49-4358-8C1F-803CC976408D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D153658-7BAF-42D3-AA20-3B6193EB184B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "249FA642-3732-4654-88CB-3F1D19A5860A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5071CA39-65B3-4AFB-8898-21819E57A084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3E2AD5B8-44C1-4981-A795-E76EFFD8C96E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "29E97E1A-268A-4F18-86A4-39A960E2082C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57562A7F-7AB2-4A35-88EB-586EF9546D50"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25A2CA45-7476-4D11-9236-15072E4C9CA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F96B92D7-ED2E-439C-B1D7-949628CF4456"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://kb.juniper.net/JSA10638",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108302060014745&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=108506952116653&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11440",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/11458",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/22341",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/415294",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.osvdb.org/4030",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/10183",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/236929/index.htm",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA04-111A.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3983",
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019",
"source": "cve@mitre.org"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886",
"source": "cve@mitre.org"
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711",
"source": "cve@mitre.org"
},
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://kb.juniper.net/JSA10638",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108302060014745&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=108506952116653&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/11440",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/11458",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/22341",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/415294",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.osvdb.org/4030",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/10183",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/236929/index.htm",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA04-111A.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3983",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorComment": "<a href=\"https://cwe.mitre.org/data/definitions/331.html\">CWE-331: Insufficient Entropy</a>",
"vendorComments": [
{
"organization": "Red Hat",
"comment": "The DHS advisory is a good source of background information about the\nissue: http://www.us-cert.gov/cas/techalerts/TA04-111A.html\n\nIt is important to note that the issue described is a known function of TCP. In order to perform a connection reset an attacker would need to know the source and destination ip address and ports as well as being able to guess the sequence number within the window. These requirements seriously reduce the ability to trigger a connection reset on normal TCP connections. The DHS advisory explains that BGP routing is a specific case where being able to trigger a reset is easier than expected as the end points can be easily determined and\nlarge window sizes are used. BGP routing is also signficantly affected by having it\u2019s connections terminated. The major BGP peers have recently switched to requiring md5 signatures which mitigates against this attack.\n\nThe following article from Linux Weekly News also puts the flaw into context and shows why it does not pose a significant threat:\nhttp://lwn.net/Articles/81560/\n\nRed Hat does not have any plans for action regarding this issue.\n",
"lastModified": "2006-08-16T00:00:00"
}
]
}