Vulnerability Name:

CVE-2004-0790 (CCN-17170)

Assigned:2004-09-01
Published:2004-09-01
Updated:2018-10-30
Summary:Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack."
Note: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: SCO
Type: UNKNOWN
SCOSA-2006.4

Source: CCN
Type: BugTraq Mailing List, Thu May 26 2005 - 12:08:50 CDT
[security bulletin] SSRT4884 rev.0 - HP-UX TCP/IP Remote Denial of Service (DoS)

Source: MITRE
Type: CNA
CVE-2004-0790

Source: MITRE
Type: CNA
CVE-2005-0065

Source: MITRE
Type: CNA
CVE-2005-0066

Source: MITRE
Type: CNA
CVE-2005-0067

Source: MITRE
Type: CNA
CVE-2005-0068

Source: CCN
Type: BlueCoat Download Web page
ProxySG Secure Proxy Appliance

Source: HP
Type: UNKNOWN
SSRT4743

Source: CCN
Type: NetApp Web site
NetApp On the Web

Source: CCN
Type: SA18317
SCO OpenServer ICMP Message Handling Denial of Service

Source: SECUNIA
Type: UNKNOWN
18317

Source: CCN
Type: SA22341
Microsoft Windows Multiple IPv6 Denial of Service Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
22341

Source: SREASON
Type: UNKNOWN
19

Source: SREASON
Type: UNKNOWN
57

Source: SUNALERT
Type: UNKNOWN
101658

Source: SUNALERT
Type: Vendor Advisory
57746

Source: CCN
Type: ASA-2006-217
Windows Security Updates for October 2006 - (MS06-056 - MS06-065)

Source: CCN
Type: Blue Coat Security Advisory July 19, 2005
Security Advisory: ICMP Error Message Vulnerabilities

Source: CCN
Type: CIAC INFORMATION BULLETIN P-177
Vulnerabilities in TCP-IP (893066)

Source: CCN
Type: CIAC INFORMATION BULLETIN P-181
Cisco Products Vulnerable to DoS via Crafted ICMP Messages

Source: CCN
Type: Cisco Web site
Cisco IP Phone 7970G Release Notes for Firmware Release 6.0(1) SR1 for Cisco CallManager Versions 3.3 and 4.0

Source: CCN
Type: Cisco Security Advisory 2005 April 12 1200 UTC (GMT)
Crafted ICMP Messages Can Cause Denial of Service

Source: CCN
Type: Gont's Web site
ICMP attacks against TCP

Source: MISC
Type: UNKNOWN
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html

Source: CCN
Type: US-CERT VU#222750
TCP/IP implementations do not adequately validate ICMP error messages

Source: CCN
Type: Microsoft Security Bulletin MS05-019
Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

Source: CCN
Type: Microsoft Security Bulletin MS06-032
Vulnerability in TCP/IP Could Allow Remote Code Execution (917953)

Source: CCN
Type: Microsoft Security Bulletin MS06-064
Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service (922819)

Source: CCN
Type: Microsoft Security Bulletin MS08-001
Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644)

Source: CCN
Type: Microsoft Security Bulletin MS08-004
Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)

Source: CCN
Type: OpenBSD 3.4 errata Web site
027: RELIABILITY FIX: August 25, 2004

Source: CCN
Type: OSVDB ID: 15620
Multiple Vendor TCP Implementation Malformed Sequence Number Range Issue

Source: CCN
Type: OSVDB ID: 15621
Multiple Vendor TCP Implementation Acknowledgement Number Checking Issue

Source: CCN
Type: OSVDB ID: 15622
Multiple Vendor TCP Implementation Port Randomization Weakness

Source: CCN
Type: OSVDB ID: 15623
Multiple Vendor ICMP Implementation Host-generated ICMP Error Message Authentication Weakness

Source: HP
Type: UNKNOWN
HPSBUX01164

Source: HP
Type: UNKNOWN
SSRT061264

Source: BID
Type: UNKNOWN
13124

Source: CCN
Type: BID-13124
Multiple Vendor TCP/IP Implementation ICMP Remote Denial Of Service Vulnerabilities

Source: MISC
Type: Vendor Advisory
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en

Source: VUPEN
Type: UNKNOWN
ADV-2006-3983

Source: MISC
Type: UNKNOWN
http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt

Source: CCN
Type: Hewlett-Packard Company Web site
IT Resource Center - login / register

Source: CCN
Type: Internet-Draft of ICMP attacks
ICMP attacks against TCP draft-gont-tcpm-icmp-attacks-03.txt

Source: MS
Type: UNKNOWN
MS05-019

Source: MS
Type: UNKNOWN
MS06-064

Source: XF
Type: UNKNOWN
icmp-protocol-unreachable-tcp(17170)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1177

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:176

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1910

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:211

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:3458

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:412

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:4804

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:514

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:53

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:622

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98:*:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:accelatech:bizsearch:3.2:-:*:*:*:linux_kernel:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_phone_7960:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:vxworks:5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_phone_7940:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_6608:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_6624:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:*
  • OR cpe:/a:bluecoat:director:5.4:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:junos:-:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:cacheos:-:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:514
    V
    HP-UX 11.11, 11.23 Blind Connection Reset Attack Vulnerability
    2014-03-24
    oval:org.mitre.oval:def:1177
    V
    HP-UX 11.11 Blind Connection Reset Attack Vulnerability
    2014-03-24
    oval:org.mitre.oval:def:211
    V
    HP-UX 11.23 Blind Connection Reset Attack Vulnerability
    2014-03-10
    oval:org.mitre.oval:def:4804
    V
    Server 2003 Blind Connection Reset Attack Vulnerability
    2013-09-02
    oval:org.mitre.oval:def:1910
    V
    WinXP Blind Connection Reset Attack Vulnerability
    2011-05-16
    oval:org.mitre.oval:def:3458
    V
    Win2k Blind Connection Reset Attack Vulnerability
    2011-05-16
    oval:org.mitre.oval:def:53
    V
    Windows XP, Windows Server 2003 Blind Connection Reset Attack Vulnerability
    2011-05-09
    oval:org.mitre.oval:def:176
    V
    HP-UX 11.00 Blind Connection Reset Attack Vulnerability
    2011-05-09
    oval:org.mitre.oval:def:622
    V
    Solaris 8, 9, 10 Blind Connection Reset Attack Vulnerability
    2011-05-09
    oval:org.mitre.oval:def:412
    V
    HP-UX 11.04 Blind Connection Reset Attack Vulnerability
    2011-05-09
    BACK
    microsoft windows 2000 * sp3
    microsoft windows 2000 * sp4
    microsoft windows 2003 server r2
    microsoft windows 98 * gold
    microsoft windows 98se *
    microsoft windows me *
    microsoft windows xp *
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    sun solaris 9.0
    sun solaris 10.0
    sun sunos 5.7
    sun sunos 5.8
    accelatech bizsearch 3.2 -
    compaq tru64 4.0f
    compaq tru64 4.0g
    compaq tru64 5.1a
    microsoft windows xp
    cisco ip phone 7960 *
    microsoft windows 2000 - sp3
    hp hp-ux b.11.00
    hp hp-ux b.11.11
    microsoft windows 2000 - sp4
    openbsd openbsd 3.4
    microsoft windows 2003 server *
    windriver vxworks 5
    hp hp-ux b.11.23
    cisco ip phone 7940 *
    cisco catalyst 6608 *
    cisco catalyst 6624 *
    cisco ios xr *
    bluecoat director 5.4
    juniper junos -
    bluecoat cacheos -
    microsoft windows vista *
    microsoft windows 7 *
    microsoft windows server 2008 *
    microsoft windows server 2008 - r2
    microsoft windows server 2012
    microsoft windows 8 *