CVE-2004-0790

Current Description

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.

Referenced by CVEs:CVE-2004-0791, CVE-2004-1060, CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, CVE-2005-0068

Basic Data

PublishedApril 12, 2005
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 2000*sp3******
    2.3OSMicrosoftWindows 2000*sp4*fr****
    2.3OSMicrosoftWindows 2003 Serverr2*******
    2.3OSMicrosoftWindows 98*gold******
    2.3OSMicrosoftWindows 98se********
    2.3OSMicrosoftWindows Me********
    2.3OSMicrosoftWindows Xp**64-bit*****
    2.3OSMicrosoftWindows Xp*sp164-bit*****
    2.3OSMicrosoftWindows Xp*sp1tablet_pc*****
    2.3OSMicrosoftWindows Xp*sp2tablet_pc*****
    2.3OSSunSolaris9.0*sparc*****
    2.3OSSunSolaris10.0*sparc*****
    2.3OSSunSunos5.7*******
    2.3OSSunSunos5.8*******

Vulnerable Software List

VendorProductVersions
Microsoft Windows Xp *
Microsoft Windows 98 *
Microsoft Windows 2000 *
Microsoft Windows 2003 Server r2
Microsoft Windows 98se *
Microsoft Windows Me *
Sun Solaris 10.0, 9.0
Sun Sunos 5.7, 5.8

References

NameSourceURLTags
SCOSA-2006.4ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txtSCO
SSRT4743http://marc.info/?l=bugtraq&m=112861397904255&w=2HP
18317http://secunia.com/advisories/18317SECUNIA
22341http://secunia.com/advisories/22341SECUNIA
19http://securityreason.com/securityalert/19SREASON
57http://securityreason.com/securityalert/57SREASON
101658http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1SUNALERT
57746http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1SUNALERTVendor Advisory
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.htmlhttp://www.gont.com.ar/drafts/icmp-attacks-against-tcp.htmlMISC
HPSBUX01164http://www.securityfocus.com/archive/1/418882/100/0/threadedHP
SSRT061264http://www.securityfocus.com/archive/1/449179/100/0/threadedHP
13124http://www.securityfocus.com/bid/13124BID
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=enhttp://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=enMISCVendor Advisory
ADV-2006-3983http://www.vupen.com/english/advisories/2006/3983VUPEN
http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txthttp://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txtMISC
MS05-019https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019MS
MS06-064https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064MS
oval:org.mitre.oval:def:1177https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177OVAL
oval:org.mitre.oval:def:176https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A176OVAL
oval:org.mitre.oval:def:1910https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910OVAL
oval:org.mitre.oval:def:211https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211OVAL
oval:org.mitre.oval:def:3458https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458OVAL
oval:org.mitre.oval:def:412https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412OVAL
oval:org.mitre.oval:def:4804https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4804OVAL
oval:org.mitre.oval:def:514https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A514OVAL
oval:org.mitre.oval:def:53https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A53OVAL
oval:org.mitre.oval:def:622https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A622OVAL