Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Alaxala |
|
Cisco |
|
F5 |
|
Freebsd |
|
Hitachi |
|
Microsoft |
|
Nortel |
|
Openbsd |
|
Yamaha |
|
Configuration 1 [-]
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: certcc
Published: 2005-05-31T04:00:00
Updated: 2024-08-07T21:13:53.238Z
Reserved: 2005-02-11T00:00:00
Link: CVE-2005-0356
Vulnrichment
No data.
NVD
Status : Modified
Published: 2005-05-31T04:00:00.000
Modified: 2024-11-20T23:54:57.377
Link: CVE-2005-0356
Redhat
No data.