Vulnerability Name: | CVE-2004-0791 (CCN-17429) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2004-08-17 | ||||||||||||||||||||||||||||||||||||
Published: | 2005-04-12 | ||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-30 | ||||||||||||||||||||||||||||||||||||
Summary: | Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." Note: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: SCO Type: UNKNOWN SCOSA-2006.4 Source: CCN Type: BugTraq Mailing List, Thu May 26 2005 - 12:08:50 CDT [security bulletin] SSRT4884 rev.0 - HP-UX TCP/IP Remote Denial of Service (DoS) Source: MITRE Type: CNA CVE-2004-0791 Source: HP Type: UNKNOWN SSRT4743 Source: CCN Type: NetApp Web site NetApp On the Web Source: CCN Type: RHSA-2005-016 kernel security update Source: CCN Type: RHSA-2005-017 kernel security update Source: CCN Type: RHSA-2005-043 kernel security update Source: CCN Type: SA18317 SCO OpenServer ICMP Message Handling Denial of Service Source: SECUNIA Type: UNKNOWN 18317 Source: SREASON Type: UNKNOWN 19 Source: SREASON Type: UNKNOWN 57 Source: SUNALERT Type: UNKNOWN 101658 Source: SUNALERT Type: Vendor Advisory 57746 Source: CCN Type: CIAC INFORMATION BULLETIN P-181 Cisco Products Vulnerable to DoS via Crafted ICMP Messages Source: CCN Type: cisco-sa-20050412-icmp Crafted ICMP Messages Can Cause Denial of Service Source: MISC Type: UNKNOWN http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html Source: CCN Type: NISCC Vulnerability Advisory 532967 Vulnerability Issues in ICMP packets with TCP payloads Source: REDHAT Type: UNKNOWN RHSA-2005:016 Source: REDHAT Type: UNKNOWN RHSA-2005:017 Source: REDHAT Type: UNKNOWN RHSA-2005:043 Source: HP Type: UNKNOWN HPSBUX01164 Source: FEDORA Type: UNKNOWN FLSA:157459-1 Source: FEDORA Type: UNKNOWN FLSA:157459-2 Source: BID Type: UNKNOWN 13124 Source: CCN Type: BID-13124 Multiple Vendor TCP/IP Implementation ICMP Remote Denial Of Service Vulnerabilities Source: MISC Type: Vendor Advisory http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en Source: MISC Type: UNKNOWN http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt Source: CCN Type: Hewlett-Packard Company Web site IT Resource Center - login / register Source: CCN Type: Internet-Draft of ICMP attacks ICMP attacks against TCP draft-gont-tcpm-icmp-attacks-03.txt Source: XF Type: UNKNOWN tcp-ip-source-quench-dos(17429) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10228 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:1112 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:184 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:464 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:596 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:688 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:726 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |