← Zuruck zu CVEs
CVE-2005-0356
N/ABeschreibung
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht5/31/2005
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
alaxala:alaxala_networkscisco:agent_desktopcisco:aironet_ap1200cisco:aironet_ap350cisco:call_managercisco:ciscoworks_1105_hosting_solution_enginecisco:ciscoworks_1105_wireless_lan_solution_enginecisco:ciscoworks_access_control_list_managercisco:ciscoworks_cd1cisco:ciscoworks_common_management_foundationcisco:ciscoworks_common_servicescisco:ciscoworks_lmscisco:ciscoworks_vpn_security_management_solutioncisco:ciscoworks_windowscisco:ciscoworks_windows_wugcisco:conference_connectioncisco:content_services_switch_11000cisco:content_services_switch_11050cisco:content_services_switch_11150cisco:content_services_switch_11500cisco:content_services_switch_11501cisco:content_services_switch_11503cisco:content_services_switch_11506cisco:content_services_switch_11800cisco:e-mail_managercisco:emergency_respondercisco:intelligent_contact_managercisco:interactive_voice_responsecisco:ip_contact_center_enterprisecisco:ip_contact_center_expresscisco:meetingplacecisco:mgx_8230cisco:mgx_8250cisco:personal_assistantcisco:remote_monitoring_suite_optioncisco:secure_access_control_servercisco:sn_5420_storage_routercisco:sn_5420_storage_router_firmwarecisco:sn_5428_storage_routercisco:support_toolscisco:unity_servercisco:web_collaboration_optioncisco:webnsf5:tmosfreebsd:freebsdhitachi:alaxalahitachi:gr3000hitachi:gr4000hitachi:gs4000microsoft:windows_2000microsoft:windows_2003_servermicrosoft:windows_xpnortel:7220_wlan_access_pointnortel:7250_wlan_access_pointnortel:business_communications_managernortel:callpilotnortel:contact_centernortel:ethernet_routing_switch_1612nortel:ethernet_routing_switch_1624nortel:ethernet_routing_switch_1648nortel:optical_metro_5000nortel:optical_metro_5100nortel:optical_metro_5200nortel:succession_communication_server_1000nortel:survivable_remote_gatewaynortel:universal_signaling_pointopenbsd:openbsdyamaha:rt105yamaha:rt250iyamaha:rt300iyamaha:rt57iyamaha:rtv700yamaha:rtx1000yamaha:rtx1100yamaha:rtx1500yamaha:rtx2000
Referenzen
http://secunia.com/advisories/15393(cret@cert.org)
http://secunia.com/advisories/15417/(cret@cert.org)
http://secunia.com/advisories/18222(cret@cert.org)
http://secunia.com/advisories/18662(cret@cert.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm(cret@cert.org)
http://www.kb.cert.org/vuls/id/637934(cret@cert.org)
http://www.securityfocus.com/bid/13676(cret@cert.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20635(cret@cert.org)
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc(af854a3a-2127-422b-91ae-364da2661108)
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/15393(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/15417/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18222(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18662(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/637934(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/13676(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20635(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.