FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2005-0356

This CVE name corresponds to:

Entered Topic
2005-06-29 kernel -- TCP connection stall denial of service

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2005-0356
Phase Assigned(20050211)

Description

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.

References

Source Reference
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm
CISCO 20050518 Vulnerability in a Variant of the TCP Timestamps Option
FREEBSD FreeBSD-SA-05:15
SCO SCOSA-2005.64
CERT-VN VU#637934
BID 13676
SECUNIA 15417
SECUNIA 15393
SECUNIA 18222
SECUNIA 18662
XF tcp-ip-timestamp-dos(20635)