Rapid7 Vulnerability & Exploit Database

FreeBSD: FreeBSD -- Denial of Service in TCP packet processing (FreeBSD-SA-14:19.tcp) (CVE-2004-0230)

Back to Search

FreeBSD: FreeBSD -- Denial of Service in TCP packet processing (FreeBSD-SA-14:19.tcp) (CVE-2004-0230)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
08/18/2004
Created
07/25/2018
Added
08/12/2016
Modified
02/21/2017

Description

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Solution(s)

  • freebsd-upgrade-base-10_0-release-p9
  • freebsd-upgrade-base-8_4-release-p16
  • freebsd-upgrade-base-9_1-release-p19
  • freebsd-upgrade-base-9_2-release-p12
  • freebsd-upgrade-base-9_3-release-p2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;