Lucene search

K
cve[email protected]CVE-2004-0230
HistoryAug 18, 2004 - 4:00 a.m.

CVE-2004-0230

2004-08-1804:00:00
web.nvd.nist.gov
677
tcp
window size
remote attackers
sequence numbers
denial of service
tcp rst packet
bgp
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.3%

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Affected configurations

NVD
Node
oraclesolarisMatch10
OR
oraclesolarisMatch11
Node
openpgpopenpgpMatch2.6.2
Node
mcafeenetwork_data_loss_preventionRange8.6
OR
mcafeenetwork_data_loss_preventionMatch9.2.0
OR
mcafeenetwork_data_loss_preventionMatch9.2.1
OR
mcafeenetwork_data_loss_preventionMatch9.2.2
Node
netbsdnetbsdMatch1.5
OR
netbsdnetbsdMatch1.5.1
OR
netbsdnetbsdMatch1.5.2
OR
netbsdnetbsdMatch1.5.3
OR
netbsdnetbsdMatch1.6
OR
netbsdnetbsdMatch1.6.1
OR
netbsdnetbsdMatch1.6.2
OR
netbsdnetbsdMatch2.0
Node
xinuosopenserverMatch5.0.6
OR
xinuosopenserverMatch5.0.7
Node
juniperjunos
Node
xinuosunixwareMatch7.1.1
OR
xinuosunixwareMatch7.1.3

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.3%