6.5 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.965 High
EPSS
Percentile
99.6%
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the “blind connection-reset attack.” NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt
marc.info/?l=bugtraq&m=112861397904255&w=2
secunia.com/advisories/18317
secunia.com/advisories/22341
securityreason.com/securityalert/19
securityreason.com/securityalert/57
sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1
sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
www.securityfocus.com/archive/1/418882/100/0/threaded
www.securityfocus.com/archive/1/449179/100/0/threaded
www.securityfocus.com/bid/13124
www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
www.vupen.com/english/advisories/2006/3983
www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt
docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A176
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4804
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A514
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A53
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A622