Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
Cisco |
|
Openbsd |
|
Yamaha |
|
Nortel |
|
Microsoft |
|
Hitachi |
|
F5 |
|
Alaxala |
|
Freebsd |
|
Configuration 1 [-]
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
|
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2005-05-31T04:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2005-02-11T00:00:00
Link: CVE-2005-0356
JSON object: View
NVD Information
Status : Modified
Published: 2005-05-31T04:00:00.000
Modified: 2019-04-30T14:27:13.913
Link: CVE-2005-0356
JSON object: View
Redhat Information
No data.
CWE