5

CVE-2004-0230

Exploit

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version < 11.4
JuniperJunos Version11.4 Update-
JuniperJunos Version11.4 Updater1
JuniperJunos Version11.4 Updater10
JuniperJunos Version11.4 Updater2
JuniperJunos Version11.4 Updater3
JuniperJunos Version11.4 Updater4
JuniperJunos Version11.4 Updater5
JuniperJunos Version11.4 Updater6
JuniperJunos Version11.4 Updater7
JuniperJunos Version11.4 Updater8
JuniperJunos Version11.4 Updater9
JuniperJunos Version11.4r13 Updates2
JuniperJunos Version11.4x27
JuniperJunos Version12.1 Update-
JuniperJunos Version12.1r
JuniperJunos Version12.1x44 Update-
JuniperJunos Version12.1x44 Updated10
JuniperJunos Version12.1x44 Updated15
JuniperJunos Version12.1x44 Updated20
JuniperJunos Version12.1x44 Updated25
JuniperJunos Version12.1x44 Updated30
JuniperJunos Version12.1x44 Updated35
JuniperJunos Version12.1x45 Update-
JuniperJunos Version12.1x45 Updated10
JuniperJunos Version12.1x45 Updated15
JuniperJunos Version12.1x45 Updated20
JuniperJunos Version12.1x46 Update-
JuniperJunos Version12.1x46 Updated10
JuniperJunos Version12.1x46 Updated15
JuniperJunos Version12.1x47 Update-
JuniperJunos Version12.2 Update-
JuniperJunos Version12.2 Updater1
JuniperJunos Version12.2 Updater2
JuniperJunos Version12.2 Updater3
JuniperJunos Version12.2 Updater4
JuniperJunos Version12.2 Updater5
JuniperJunos Version12.2 Updater6
JuniperJunos Version12.2 Updater7
JuniperJunos Version12.3 Update-
JuniperJunos Version12.3 Updater1
JuniperJunos Version12.3 Updater2
JuniperJunos Version12.3 Updater3
JuniperJunos Version12.3 Updater4
JuniperJunos Version12.3 Updater5
JuniperJunos Version13.1 Update-
JuniperJunos Version13.1 Updater1
JuniperJunos Version13.1 Updater2
JuniperJunos Version13.1 Updater3
JuniperJunos Version13.2 Update-
JuniperJunos Version13.2 Updater1
JuniperJunos Version13.2 Updater2
JuniperJunos Version13.2 Updater3
JuniperJunos Version13.3 Update-
JuniperJunos Version13.3 Updater1
MicrosoftWindows 2000 Version- Updatesp3
MicrosoftWindows 2000 Version- Updatesp4
MicrosoftWindows 98 Version-
MicrosoftWindows 98se Version-
MicrosoftWindows Server 2003 Version- HwPlatformitanium
MicrosoftWindows Server 2003 Version- HwPlatformx64
MicrosoftWindows Server 2003 Version- Updatesp1 HwPlatform-
MicrosoftWindows Server 2003 Version- Updatesp1 HwPlatformitanium
MicrosoftWindows Xp Version- Editionx64
MicrosoftWindows Xp Version- Updatesp1
MicrosoftWindows Xp Version- Updatesp1 HwPlatformitanium
MicrosoftWindows Xp Version- Updatesp2
OracleSolaris Version10
OracleSolaris Version11
OpenpgpOpenpgp Version2.6.2
NetbsdNetbsd Version1.5
NetbsdNetbsd Version1.5.1
NetbsdNetbsd Version1.5.2
NetbsdNetbsd Version1.5.3
NetbsdNetbsd Version1.6
NetbsdNetbsd Version1.6.1
NetbsdNetbsd Version1.6.2
NetbsdNetbsd Version2.0
XinuosOpenserver Version5.0.6
XinuosOpenserver Version5.0.7
XinuosUnixware Version7.1.1
XinuosUnixware Version7.1.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 8.89% 0.923
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
http://kb.juniper.net/JSA10638
Third Party Advisory
http://secunia.com/advisories/11440
Third Party Advisory
Broken Link
VDB Entry
Permissions Required
http://secunia.com/advisories/11458
Third Party Advisory
Broken Link
VDB Entry
Permissions Required
http://secunia.com/advisories/22341
Third Party Advisory
Broken Link
VDB Entry
Permissions Required
http://www.kb.cert.org/vuls/id/415294
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/10183
Third Party Advisory
Exploit
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
Third Party Advisory
US Government Resource
http://www.vupen.com/english/advisories/2006/3983
Broken Link
Permissions Required