CVE-2004-0791

Current Description

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.

Referenced by CVEs:CVE-2004-0790, CVE-2004-1060, CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, CVE-2005-0068

Basic Data

PublishedApril 12, 2005
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSunSolaris9.0*sparc*****
    2.3OSSunSolaris10.0*sparc*****
    2.3OSSunSunos5.7*******
    2.3OSSunSunos5.8*******

Vulnerable Software List

VendorProductVersions
Sun Solaris 10.0, 9.0
Sun Sunos 5.7, 5.8

References

NameSourceURLTags
SCOSA-2006.4ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txtSCO
SSRT4743http://marc.info/?l=bugtraq&m=112861397904255&w=2HP
18317http://secunia.com/advisories/18317SECUNIA
19http://securityreason.com/securityalert/19SREASON
57http://securityreason.com/securityalert/57SREASON
101658http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1SUNALERT
57746http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1SUNALERTVendor Advisory
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.htmlhttp://www.gont.com.ar/drafts/icmp-attacks-against-tcp.htmlMISC
RHSA-2005:016http://www.redhat.com/support/errata/RHSA-2005-016.htmlREDHAT
RHSA-2005:017http://www.redhat.com/support/errata/RHSA-2005-017.htmlREDHAT
RHSA-2005:043http://www.redhat.com/support/errata/RHSA-2005-043.htmlREDHAT
HPSBUX01164http://www.securityfocus.com/archive/1/418882/100/0/threadedHP
FLSA:157459-1http://www.securityfocus.com/archive/1/428028/100/0/threadedFEDORA
FLSA:157459-2http://www.securityfocus.com/archive/1/428058/100/0/threadedFEDORA
13124http://www.securityfocus.com/bid/13124BID
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=enhttp://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=enMISCVendor Advisory
http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txthttp://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txtMISC
oval:org.mitre.oval:def:10228https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228OVAL
oval:org.mitre.oval:def:1112https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112OVAL
oval:org.mitre.oval:def:184https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184OVAL
oval:org.mitre.oval:def:464https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464OVAL
oval:org.mitre.oval:def:596https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596OVAL
oval:org.mitre.oval:def:688https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688OVAL
oval:org.mitre.oval:def:726https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726OVAL