Vulnerability Name:

CVE-2005-2068 (CCN-21240)

Assigned:2005-06-29
Published:2005-06-29
Updated:2008-09-05
Summary:FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-05:15.tcp
TCP connection stall denial of service

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-05:15

Source: MITRE
Type: CNA
CVE-2005-2068

Source: CCN
Type: OSVDB ID: 17677
FreeBSD TCP Crafted SYN Packet Arbitrary Option Overwrite

Source: CCN
Type: BID-14104
FreeBSD TCP Stack Established Connection Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
freebsd-syn-tcp-overwrite(21240)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.9:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.11:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.4:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 4.0
    freebsd freebsd 4.1
    freebsd freebsd 4.1.1
    freebsd freebsd 4.2
    freebsd freebsd 4.3
    freebsd freebsd 4.4
    freebsd freebsd 4.5
    freebsd freebsd 4.6
    freebsd freebsd 4.6.2
    freebsd freebsd 4.7
    freebsd freebsd 4.8
    freebsd freebsd 4.9
    freebsd freebsd 4.10
    freebsd freebsd 4.11
    freebsd freebsd 5.0
    freebsd freebsd 5.1
    freebsd freebsd 5.2
    freebsd freebsd 5.2.1
    freebsd freebsd 5.3
    freebsd freebsd 5.4
    freebsd freebsd *