Vulnerabilities > CVE-2005-0356 - Remote Denial Of Service vulnerability in Multiple Vendor TCP Timestamp PAWS

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
cisco
hitachi
nortel
freebsd
microsoft
openbsd
alaxala
yamaha
f5
nessus
exploit available

Summary

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.

Vulnerable Configurations

Part Description Count
Application
Cisco
62
Application
Hitachi
1
Application
Nortel
8
Hardware
Cisco
32
Hardware
Nortel
12
Hardware
Alaxala
3
Hardware
Hitachi
3
Hardware
Yamaha
9
OS
Cisco
27
OS
Freebsd
92
OS
Microsoft
22
OS
Openbsd
7
OS
F5
18

Exploit-Db

descriptionTCP TIMESTAMPS Denial of Service Exploit. CVE-2005-0356. Dos exploits for multiple platform
idEDB-ID:1008
last seen2016-01-31
modified2005-05-21
published2005-05-21
reporterDaniel Hartmeier
sourcehttps://www.exploit-db.com/download/1008/
titleTCP TIMESTAMPS Denial of Service Exploit

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL4743.NASL
descriptionMultiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
last seen2020-06-01
modified2020-06-02
plugin id78204
published2014-10-10
reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/78204
titleF5 Networks BIG-IP : Inadequate validation for TCP segments (SOL4743)
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from F5 Networks BIG-IP Solution SOL4743.
#
# The text description of this plugin is (C) F5 Networks.
#

include("compat.inc");

if (description)
{
  script_id(78204);
  script_version("1.7");
  script_cvs_date("Date: 2019/10/25 13:36:06");

  script_cve_id("CVE-2005-0356");

  script_name(english:"F5 Networks BIG-IP : Inadequate validation for TCP segments (SOL4743)");
  script_summary(english:"Checks the BIG-IP version.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote device is missing a vendor-supplied security patch."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Multiple TCP implementations with Protection Against Wrapped Sequence
Numbers (PAWS) with the timestamps option enabled allow remote
attackers to cause a denial of service (connection loss) via a spoofed
packet with a large timer value, which causes the host to discard
later packets because they appear to be too old."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://support.f5.com/csp/article/K4743"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade to one of the non-vulnerable versions listed in the F5
Solution SOL4743."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/05/16");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/10");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"F5 Networks Local Security Checks");

  script_dependencies("f5_bigip_detect.nbin");
  script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version");

  exit(0);
}


include("f5_func.inc");

if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
version = get_kb_item("Host/BIG-IP/version");
if ( ! version ) audit(AUDIT_OS_NOT, "F5 Networks BIG-IP");
if ( isnull(get_kb_item("Host/BIG-IP/hotfix")) ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/hotfix");
if ( ! get_kb_item("Host/BIG-IP/modules") ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/modules");

sol = "SOL4743";
vmatrix = make_array();

# LTM
vmatrix["LTM"] = make_array();
vmatrix["LTM"]["affected"  ] = make_list("9.0.0-9.0.5");
vmatrix["LTM"]["unaffected"] = make_list("9.1","9.2","9.3","9.4","9.6","10","11");


if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
{
  if (report_verbosity > 0) security_warning(port:0, extra:bigip_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = bigip_get_tested_modules();
  audit_extra = "For BIG-IP module(s) " + tested + ",";
  if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
  else audit(AUDIT_HOST_NOT, "running the affected module LTM");
}