{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-04-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"oval:org.mitre.oval:def:2689","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689"},{"name":"oval:org.mitre.oval:def:3508","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508"},{"name":"TA04-111A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA04-111A.html"},{"name":"oval:org.mitre.oval:def:5711","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711"},{"name":"20040425 Perl code exploting TCP not checking RST ACK.","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=108302060014745&w=2"},{"name":"SSRT061264","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.uniras.gov.uk/vuls/2004/236929/index.htm"},{"name":"MS06-064","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"},{"name":"11440","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/11440"},{"tags":["x_refsource_CONFIRM"],"url":"http://kb.juniper.net/JSA10638"},{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"name":"VU#415294","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/415294"},{"name":"SSRT4696","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=108506952116653&w=2"},{"name":"SCOSA-2005.9","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt"},{"name":"20040403-01-A","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc"},{"name":"MS05-019","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"},{"name":"HPSBST02161","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"name":"20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml"},{"name":"SCOSA-2005.3","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt"},{"name":"10183","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/10183"},{"name":"oval:org.mitre.oval:def:4791","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791"},{"name":"SCOSA-2005.14","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt"},{"name":"oval:org.mitre.oval:def:270","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270"},{"name":"tcp-rst-dos(15886)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886"},{"name":"4030","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/4030"},{"name":"22341","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22341"},{"name":"NetBSD-SA2004-006","tags":["vendor-advisory","x_refsource_NETBSD"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc"},{"name":"ADV-2006-3983","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/3983"},{"name":"11458","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/11458"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-0230","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"oval:org.mitre.oval:def:2689","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689"},{"name":"oval:org.mitre.oval:def:3508","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508"},{"name":"TA04-111A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA04-111A.html"},{"name":"oval:org.mitre.oval:def:5711","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711"},{"name":"20040425 Perl code exploting TCP not checking RST ACK.","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=108302060014745&w=2"},{"name":"SSRT061264","refsource":"HP","url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"name":"http://www.uniras.gov.uk/vuls/2004/236929/index.htm","refsource":"MISC","url":"http://www.uniras.gov.uk/vuls/2004/236929/index.htm"},{"name":"MS06-064","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"},{"name":"11440","refsource":"SECUNIA","url":"http://secunia.com/advisories/11440"},{"name":"http://kb.juniper.net/JSA10638","refsource":"CONFIRM","url":"http://kb.juniper.net/JSA10638"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"name":"VU#415294","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/415294"},{"name":"SSRT4696","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=108506952116653&w=2"},{"name":"SCOSA-2005.9","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt"},{"name":"20040403-01-A","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc"},{"name":"MS05-019","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"},{"name":"HPSBST02161","refsource":"HP","url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"name":"20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products","refsource":"CISCO","url":"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml"},{"name":"SCOSA-2005.3","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt"},{"name":"10183","refsource":"BID","url":"http://www.securityfocus.com/bid/10183"},{"name":"oval:org.mitre.oval:def:4791","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791"},{"name":"SCOSA-2005.14","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt"},{"name":"oval:org.mitre.oval:def:270","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270"},{"name":"tcp-rst-dos(15886)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886"},{"name":"4030","refsource":"OSVDB","url":"http://www.osvdb.org/4030"},{"name":"22341","refsource":"SECUNIA","url":"http://secunia.com/advisories/22341"},{"name":"NetBSD-SA2004-006","refsource":"NETBSD","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc"},{"name":"ADV-2006-3983","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/3983"},{"name":"11458","refsource":"SECUNIA","url":"http://secunia.com/advisories/11458"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-08T00:10:03.682Z"},"title":"CVE Program Container","references":[{"name":"oval:org.mitre.oval:def:2689","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689"},{"name":"oval:org.mitre.oval:def:3508","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508"},{"name":"TA04-111A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA04-111A.html"},{"name":"oval:org.mitre.oval:def:5711","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711"},{"name":"20040425 Perl code exploting TCP not checking RST ACK.","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=108302060014745&w=2"},{"name":"SSRT061264","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.uniras.gov.uk/vuls/2004/236929/index.htm"},{"name":"MS06-064","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"},{"name":"11440","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/11440"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kb.juniper.net/JSA10638"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"name":"VU#415294","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/415294"},{"name":"SSRT4696","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=108506952116653&w=2"},{"name":"SCOSA-2005.9","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt"},{"name":"20040403-01-A","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc"},{"name":"MS05-019","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"},{"name":"HPSBST02161","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/449179/100/0/threaded"},{"name":"20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml"},{"name":"SCOSA-2005.3","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt"},{"name":"10183","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/10183"},{"name":"oval:org.mitre.oval:def:4791","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791"},{"name":"SCOSA-2005.14","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt"},{"name":"oval:org.mitre.oval:def:270","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270"},{"name":"tcp-rst-dos(15886)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886"},{"name":"4030","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/4030"},{"name":"22341","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22341"},{"name":"NetBSD-SA2004-006","tags":["vendor-advisory","x_refsource_NETBSD","x_transferred"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc"},{"name":"ADV-2006-3983","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/3983"},{"name":"11458","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/11458"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-0230","datePublished":"2004-05-05T04:00:00.000Z","dateReserved":"2004-03-17T00:00:00.000Z","dateUpdated":"2024-08-08T00:10:03.682Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}