Vulnerability Name:

CVE-2005-0067 (CCN-17170)

Assigned:2004-09-01
Published:2004-09-01
Updated:2008-09-05
Summary:The original design of TCP does not require that port numbers be assigned randomly (aka "Port randomization"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced.
Note: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Thu May 26 2005 - 12:08:50 CDT
[security bulletin] SSRT4884 rev.0 - HP-UX TCP/IP Remote Denial of Service (DoS)

Source: MITRE
Type: CNA
CVE-2004-0790

Source: MITRE
Type: CNA
CVE-2005-0065

Source: MITRE
Type: CNA
CVE-2005-0066

Source: MITRE
Type: CNA
CVE-2005-0067

Source: MITRE
Type: CNA
CVE-2005-0068

Source: CCN
Type: BlueCoat Download Web page
ProxySG Secure Proxy Appliance

Source: CCN
Type: NetApp Web site
NetApp On the Web

Source: CCN
Type: SA18317
SCO OpenServer ICMP Message Handling Denial of Service

Source: CCN
Type: SA22341
Microsoft Windows Multiple IPv6 Denial of Service Vulnerabilities

Source: CCN
Type: ASA-2006-217
Windows Security Updates for October 2006 - (MS06-056 - MS06-065)

Source: CCN
Type: Blue Coat Security Advisory July 19, 2005
Security Advisory: ICMP Error Message Vulnerabilities

Source: CCN
Type: CIAC INFORMATION BULLETIN P-177
Vulnerabilities in TCP-IP (893066)

Source: CCN
Type: CIAC INFORMATION BULLETIN P-181
Cisco Products Vulnerable to DoS via Crafted ICMP Messages

Source: CCN
Type: Cisco Web site
Cisco IP Phone 7970G Release Notes for Firmware Release 6.0(1) SR1 for Cisco CallManager Versions 3.3 and 4.0

Source: CCN
Type: Cisco Security Advisory 2005 April 12 1200 UTC (GMT)
Crafted ICMP Messages Can Cause Denial of Service

Source: CCN
Type: Gont's Web site
ICMP attacks against TCP

Source: MISC
Type: Vendor Advisory
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html

Source: CCN
Type: US-CERT VU#222750
TCP/IP implementations do not adequately validate ICMP error messages

Source: CCN
Type: Microsoft Security Bulletin MS05-019
Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

Source: CCN
Type: Microsoft Security Bulletin MS06-032
Vulnerability in TCP/IP Could Allow Remote Code Execution (917953)

Source: CCN
Type: Microsoft Security Bulletin MS06-064
Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service (922819)

Source: CCN
Type: Microsoft Security Bulletin MS08-001
Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644)

Source: CCN
Type: Microsoft Security Bulletin MS08-004
Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)

Source: CCN
Type: OpenBSD 3.4 errata Web site
027: RELIABILITY FIX: August 25, 2004

Source: CCN
Type: OSVDB ID: 15620
Multiple Vendor TCP Implementation Malformed Sequence Number Range Issue

Source: CCN
Type: OSVDB ID: 15621
Multiple Vendor TCP Implementation Acknowledgement Number Checking Issue

Source: CCN
Type: OSVDB ID: 15622
Multiple Vendor TCP Implementation Port Randomization Weakness

Source: CCN
Type: OSVDB ID: 15623
Multiple Vendor ICMP Implementation Host-generated ICMP Error Message Authentication Weakness

Source: BID
Type: UNKNOWN
13124

Source: CCN
Type: BID-13124
Multiple Vendor TCP/IP Implementation ICMP Remote Denial Of Service Vulnerabilities

Source: CCN
Type: Hewlett-Packard Company Web site
IT Resource Center - login / register

Source: CCN
Type: Internet-Draft of ICMP attacks
ICMP attacks against TCP draft-gont-tcpm-icmp-attacks-03.txt

Source: XF
Type: UNKNOWN
icmp-protocol-unreachable-tcp(17170)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tcp:tcp:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:accelatech:bizsearch:3.2:-:*:*:*:linux_kernel:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_phone_7960:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:vxworks:5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_phone_7940:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_6608:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_6624:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:*
  • OR cpe:/a:bluecoat:director:5.4:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:junos:-:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:cacheos:-:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    tcp tcp *
    accelatech bizsearch 3.2 -
    compaq tru64 4.0f
    compaq tru64 4.0g
    compaq tru64 5.1a
    microsoft windows xp
    cisco ip phone 7960 *
    microsoft windows 2000 - sp3
    hp hp-ux b.11.00
    hp hp-ux b.11.11
    microsoft windows 2000 - sp4
    openbsd openbsd 3.4
    microsoft windows 2003 server *
    windriver vxworks 5
    hp hp-ux b.11.23
    cisco ip phone 7940 *
    cisco catalyst 6608 *
    cisco catalyst 6624 *
    cisco ios xr *
    bluecoat director 5.4
    juniper junos -
    bluecoat cacheos -
    microsoft windows vista *
    microsoft windows 7 *
    microsoft windows server 2008 *
    microsoft windows server 2008 - r2
    microsoft windows server 2012
    microsoft windows 8 *