Files
CVEs-PoC/2004/CVE-2004-0230.md
T
2024-07-25 21:25:12 +00:00

25 lines
1.2 KiB
Markdown

### [CVE-2004-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
### POC
#### Reference
- http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
- http://www.kb.cert.org/vuls/id/415294
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
- https://kc.mcafee.com/corporate/index?page=content&id=SB10053
#### Github
- https://github.com/auditt7708/rhsecapi
- https://github.com/biswajitde/dsm_ips
- https://github.com/gabrieljcs/ips-assessment-reports