Freebsd SA-05:15.tcp.asc Vulnerabilitie
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | K4743 : Inadequate validation for TCP segments CVE-2005-0356 | 28 Mar 201300:00 | – | f5 |
![]() | SOL4743 - Inadequate validation for TCP segments CVE-2005-0356 | 16 May 200700:00 | – | f5 |
![]() | CVE-2005-0356 | 31 May 200500:00 | – | ubuntucve |
![]() | FreeBSD Security Advisory (FreeBSD-SA-05:15.tcp.asc) | 4 Sep 200800:00 | – | openvas |
![]() | CVE-2005-0356 | 31 May 200504:00 | – | cve |
![]() | F5 Networks BIG-IP : Inadequate validation for TCP segments (SOL4743) | 10 Oct 201400:00 | – | nessus |
![]() | [SA15851] Blue Coat Products TCP Timestamp Denial of Service | 29 Jun 200500:00 | – | securityvulns |
![]() | FreeBSD Security Advisory FreeBSD-SA-05:15.tcp | 30 Jun 200500:00 | – | securityvulns |
![]() | CVE-2005-0356 | 30 Oct 201509:29 | – | redhatcve |
![]() | CVE-2005-0356 | 31 May 200504:00 | – | nvd |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
securityfocus | www.securityfocus.com/bid/13676 |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53976");
script_version("2023-07-26T05:05:09+0000");
script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
script_cve_id("CVE-2005-0356");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("FreeBSD Security Advisory (FreeBSD-SA-05:15.tcp.asc)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdpatchlevel");
script_tag(name:"insight", value:"The Transmission Control Protocol (TCP) of the TCP/IP protocol suite
provides a connection-oriented, reliable, sequence-preserving data
stream service. TCP timestamps are used to measure Round-Trip Time
and in the Protect Against Wrapped Sequences (PAWS) algorithm. TCP
packets with the SYN flag set are used during setup of new TCP
connections.
Two problems have been discovered in the FreeBSD TCP stack.
First, when a TCP packets containing a timestamp is received, inadequate
checking of sequence numbers is performed, allowing an attacker to
artificially increase the internal recent timestamp for a connection.
Second, a TCP packet with the SYN flag set is accepted for established
connections, allowing an attacker to overwrite certain TCP options.");
script_tag(name:"solution", value:"Upgrade your system to the appropriate stable release
or security branch dated after the correction date.");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-05:15.tcp.asc");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/13676");
script_tag(name:"summary", value:"The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-05:15.tcp.asc");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-bsd.inc");
vuln = FALSE;
if(patchlevelcmp(rel:"5.4", patchlevel:"3")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"5.3", patchlevel:"17")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"4.11", patchlevel:"11")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"4.10", patchlevel:"16")<0) {
vuln = TRUE;
}
if(vuln) {
security_message(port:0);
} else if (__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo