Vulnerability Description
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | < 11.4 |
| Microsoft | Windows 2000 | - |
| Microsoft | Windows 98 | - |
| Microsoft | Windows 98Se | - |
| Microsoft | Windows Server 2003 | - |
| Microsoft | Windows Xp | - |
| Oracle | Solaris | 10 |
| Openpgp | Openpgp | 2.6.2 |
| Mcafee | Network Data Loss Prevention | <= 8.6 |
| Netbsd | Netbsd | 1.5 |
| Xinuos | Openserver | 5.0.6 |
| Xinuos | Unixware | 7.1.1 |
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.ascBroken LinkThird Party Advisory
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txtBroken LinkThird Party Advisory
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txtBroken LinkThird Party Advisory
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txtBroken LinkThird Party Advisory
- ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.ascBroken LinkThird Party Advisory
- http://kb.juniper.net/JSA10638Third Party Advisory
- http://marc.info/?l=bugtraq&m=108302060014745&w=2Mailing List
- http://marc.info/?l=bugtraq&m=108506952116653&w=2Mailing List
- http://secunia.com/advisories/11440Broken LinkPermissions RequiredThird Party Advisory
- http://secunia.com/advisories/11458Broken LinkPermissions RequiredThird Party Advisory
- http://secunia.com/advisories/22341Broken LinkPermissions RequiredThird Party Advisory
- http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtmlBroken Link
- http://www.kb.cert.org/vuls/id/415294Third Party AdvisoryUS Government Resource
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlPatchThird Party Advisory
- http://www.osvdb.org/4030Broken Link
FAQ
What is CVE-2004-0230?
CVE-2004-0230 is a vulnerability with a CVSS score of 5.0 (MEDIUM). TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injectin...
How severe is CVE-2004-0230?
CVE-2004-0230 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0230?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Microsoft Windows 2000, Microsoft Windows 98, Microsoft Windows 98Se, Microsoft Windows Server 2003.