[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-0356Date: (C)2005-05-31   (M)2023-12-22


Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
BID-13676
SECUNIA-15393
SECUNIA-15417
SECUNIA-18222
SECUNIA-18662
http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml
FreeBSD-SA-05:15
SCOSA-2005.64
VU#637934
http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm
tcp-ip-timestamp-dos(20635)

CPE    157
cpe:/h:nortel:survivable_remote_gateway:1.0
cpe:/o:freebsd:freebsd:2.1.6.1
cpe:/o:freebsd:freebsd:2.1.5
cpe:/o:freebsd:freebsd:2.1.6
...

© SecPod Technologies