5

CVE-2005-1184

The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets.  NOTE: some followups indicate that this issue could not be replicated.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 2000 Updatesp1
MicrosoftWindows 2000 Updatesp2
MicrosoftWindows 2000 Updatesp3
MicrosoftWindows 2000 Updatesp4
MicrosoftWindows 2003 Server Versiondatacenter_64-bit Updatesp1
MicrosoftWindows 2003 Server Versionenterprise Edition64-bit
MicrosoftWindows 2003 Server Versionenterprise Updatesp1
MicrosoftWindows 2003 Server Versionenterprise_64-bit
MicrosoftWindows 2003 Server Versionenterprise_64-bit Updatesp1
MicrosoftWindows 2003 Server Versionr2 Edition64-bit
MicrosoftWindows 2003 Server Versionr2 Editiondatacenter_64-bit
MicrosoftWindows 2003 Server Versionr2 Updatesp1
MicrosoftWindows 2003 Server Versionstandard Edition64-bit
MicrosoftWindows 2003 Server Versionstandard Updatesp1
MicrosoftWindows 2003 Server Versionstandard_64-bit
MicrosoftWindows 2003 Server Versionweb Updatesp1
MicrosoftWindows Nt Version4.0 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Editionserver
MicrosoftWindows Nt Version4.0 Editionterminal_server
MicrosoftWindows Nt Version4.0 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp1 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp1 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp1 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp1 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp2 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp2 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp2 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp2 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp3 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp3 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp3 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp3 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp4 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp4 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp4 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp4 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp5 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp5 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp5 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp5 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp6 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp6 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp6 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp6 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp6a Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp6a Editionserver
MicrosoftWindows Nt Version4.0 Updatesp6a Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp6a Editionworkstation
MicrosoftWindows Xp Editionhome
MicrosoftWindows Xp Updategold Editionprofessional
MicrosoftWindows Xp Updatesp1 Editionhome
MicrosoftWindows Xp Updatesp2 Editionhome
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 76.74% 0.989
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P