Vulnerabilities > CVE-2005-0356 - Remote Denial Of Service vulnerability in Multiple Vendor TCP Timestamp PAWS
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
Vulnerable Configurations
Exploit-Db
description | TCP TIMESTAMPS Denial of Service Exploit. CVE-2005-0356. Dos exploits for multiple platform |
id | EDB-ID:1008 |
last seen | 2016-01-31 |
modified | 2005-05-21 |
published | 2005-05-21 |
reporter | Daniel Hartmeier |
source | https://www.exploit-db.com/download/1008/ |
title | TCP TIMESTAMPS Denial of Service Exploit |
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL4743.NASL |
description | Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 78204 |
published | 2014-10-10 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/78204 |
title | F5 Networks BIG-IP : Inadequate validation for TCP segments (SOL4743) |
code |
|
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt
- http://secunia.com/advisories/15393
- http://secunia.com/advisories/15417/
- http://secunia.com/advisories/18222
- http://secunia.com/advisories/18662
- http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm
- http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml
- http://www.kb.cert.org/vuls/id/637934
- http://www.securityfocus.com/bid/13676
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20635