blob: 765295f8f1056ca856564cc88d94e6cd2467ab0c (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
|
Candidate: CVE-2004-0790
References:
MISC:http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt
MISC:http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
MISC:http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
HP:HPSBTU01210
URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112861397904255&w=2
HP:SSRT4743
URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112861397904255&w=2
HP:SSRT4884
URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112861397904255&w=2
MS:MS05-019
URL:http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx
SUNALERT:57746
URL:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
OVAL:OVAL3458
URL:http://oval.mitre.org/oval/definitions/data/oval3458.html
OVAL:OVAL1910
URL:http://oval.mitre.org/oval/definitions/data/oval1910.html
OVAL:OVAL4804
URL:http://oval.mitre.org/oval/definitions/data/oval4804.html
Description:
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a
denial of service (reset TCP connections) via spoofed ICMP error messages, aka
the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and
CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065,
CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that
are SPLIT based on the underlying vulnerability. While CVE normally SPLITs
based on vulnerability, the attack-based identifiers exist due to the variety
and number of affected implementations and solutions that address the attacks
instead of the underlying vulnerabilities.
Notes:
Bugs: 305655 305664
upstream:
linux-2.6:
2.6.8-sarge-security: released (2.6.8-16) [net-ipv4-icmp-quench.dpatch]
2.4.27-sarge-security: released (2.4.27-10) [164_net-ipv4-icmp-quench.diff]
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
2.4.18-woody-security-hppa:
|