CVE-2004-0230 (CNNVD-200408-159)

MEDIUM 有利用代码
中文标题:
TCP协议安全漏洞
英文标题:
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers ...
CVSS分数: 5.0
发布时间: 2004-05-05 04:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v10
漏洞描述
中文描述:

TCP(Transmission Control Protocol,传输控制协议)是一种面向连接的、可靠的、基于字节流的传输层通信协议,由IETF的RFC 793定义。 TCP协议中存在安全漏洞。攻击者通过反复注入TCP RST数据包利用该漏洞猜测出序列号并造成拒绝服务(连接丢失)。以下产品及版本受到影响:Oracle Solaris 10版本,11版本;Openpgp 2.6.2版本;Mcafee Network Data Loss Prevention 8.6及之前版本,9.2.0版本,9.2.1版本,9.2.2版本;Netbsd 1.5版本,1.5.1版本,1.5.2版本,1.5.3版本,1.6版本,1.6.1版本,1.6.2版本,2.0版本;Xinuos Openserver 5.0.6版本,5.0.7版本;Juniper Networks Junos OS;Xinuos Unixware 7.1.1版本,7.1.3版本。

英文描述:

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

CWE类型:
(暂无数据)
标签:
remote multiple Matt Edman OSVDB-13619 Paul A. Watson Paul Watson K-sPecial dos windows Aphex OSVDB-4030 linux Yuri Gushin MS05-019
受影响产品
厂商 产品 版本 版本范围 平台 CPE
juniper junos * - - cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
juniper junos 11.4 - - cpe:2.3:o:juniper:junos:11.4:-:*:*:*:*:*:*
juniper junos 11.4r13 - - cpe:2.3:o:juniper:junos:11.4r13:s2:*:*:*:*:*:*
juniper junos 11.4x27 - - cpe:2.3:o:juniper:junos:11.4x27:*:*:*:*:*:*:*
juniper junos 12.1 - - cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*
juniper junos 12.1r - - cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*
juniper junos 12.1x44 - - cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:*
juniper junos 12.1x45 - - cpe:2.3:o:juniper:junos:12.1x45:-:*:*:*:*:*:*
juniper junos 12.1x46 - - cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*
juniper junos 12.1x47 - - cpe:2.3:o:juniper:junos:12.1x47:-:*:*:*:*:*:*
juniper junos 12.2 - - cpe:2.3:o:juniper:junos:12.2:-:*:*:*:*:*:*
juniper junos 12.3 - - cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*
juniper junos 13.1 - - cpe:2.3:o:juniper:junos:13.1:-:*:*:*:*:*:*
juniper junos 13.2 - - cpe:2.3:o:juniper:junos:13.2:-:*:*:*:*:*:*
juniper junos 13.3 - - cpe:2.3:o:juniper:junos:13.3:-:*:*:*:*:*:*
microsoft windows_2000 - - - cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
microsoft windows_98 - - - cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*
microsoft windows_98se - - - cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*
microsoft windows_server_2003 - - - cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:itanium:*
microsoft windows_xp - - - cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*
oracle solaris 10 - - cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
oracle solaris 11 - - cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
openpgp openpgp 2.6.2 - - cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*
mcafee network_data_loss_prevention * - - cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
mcafee network_data_loss_prevention 9.2.0 - - cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*
mcafee network_data_loss_prevention 9.2.1 - - cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*
mcafee network_data_loss_prevention 9.2.2 - - cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*
netbsd netbsd 1.5 - - cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
netbsd netbsd 1.5.1 - - cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
netbsd netbsd 1.5.2 - - cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
netbsd netbsd 1.5.3 - - cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
netbsd netbsd 1.6 - - cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
netbsd netbsd 1.6.1 - - cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
netbsd netbsd 1.6.2 - - cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
netbsd netbsd 2.0 - - cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
xinuos openserver 5.0.6 - - cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*
xinuos openserver 5.0.7 - - cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*
xinuos unixware 7.1.1 - - cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*
xinuos unixware 7.1.3 - - cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
oval:org.mitre.oval:def:2689 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:3508 vdb-entry
cve.org
访问
TA04-111A third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:5711 vdb-entry
cve.org
访问
20040425 Perl code exploting TCP not checking RST ACK. mailing-list
cve.org
访问
SSRT061264 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
MS06-064 vendor-advisory
cve.org
访问
11440 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
VU#415294 third-party-advisory
cve.org
访问
SSRT4696 vendor-advisory
cve.org
访问
SCOSA-2005.9 vendor-advisory
cve.org
访问
20040403-01-A vendor-advisory
cve.org
访问
MS05-019 vendor-advisory
cve.org
访问
20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products vendor-advisory
cve.org
访问
SCOSA-2005.3 vendor-advisory
cve.org
访问
10183 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:4791 vdb-entry
cve.org
访问
SCOSA-2005.14 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:270 vdb-entry
cve.org
访问
tcp-rst-dos(15886) vdb-entry
cve.org
访问
4030 vdb-entry
cve.org
访问
22341 third-party-advisory
cve.org
访问
NetBSD-SA2004-006 vendor-advisory
cve.org
访问
ADV-2006-3983 vdb-entry
cve.org
访问
11458 third-party-advisory
cve.org
访问
ExploitDB EDB-24030 EXPLOIT
exploitdb
访问
Download Exploit EDB-24030 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2004-0230 ADVISORY
cve.org
访问
ExploitDB EDB-24031 EXPLOIT
exploitdb
访问
Download Exploit EDB-24031 EXPLOIT
exploitdb
访问
ExploitDB EDB-24032 EXPLOIT
exploitdb
访问
Download Exploit EDB-24032 EXPLOIT
exploitdb
访问
ExploitDB EDB-24033 EXPLOIT
exploitdb
访问
Download Exploit EDB-24033 EXPLOIT
exploitdb
访问
ExploitDB EDB-276 EXPLOIT
exploitdb
访问
Download Exploit EDB-276 EXPLOIT
exploitdb
访问
ExploitDB EDB-291 EXPLOIT
exploitdb
访问
Download Exploit EDB-291 EXPLOIT
exploitdb
访问
ExploitDB EDB-942 EXPLOIT
exploitdb
访问
Download Exploit EDB-942 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2005-0688 ADVISORY
cve.org
访问
CVE Reference: CVE-2005-0048 ADVISORY
cve.org
访问
CVE Reference: CVE-2004-1060 ADVISORY
cve.org
访问
CVE Reference: CVE-2004-0790 ADVISORY
cve.org
访问
CVSS评分详情
5.0
MEDIUM
CVSS向量: AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2004-05-05 04:00:00
修改时间:
2024-08-08 00:10:03
创建时间:
2025-11-11 15:32:20
更新时间:
2025-11-11 17:06:30
利用信息
此漏洞有可利用代码!
利用代码数量: 7
利用来源:
未知 未知 未知 未知 未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-0230 2025-11-11 15:17:28 2025-11-11 07:32:20
NVD nvd_CVE-2004-0230 2025-11-11 14:50:55 2025-11-11 07:41:07
CNNVD cnnvd_CNNVD-200408-159 2025-11-11 15:08:44 2025-11-11 07:48:54
EXPLOITDB exploitdb_EDB-24030 2025-11-11 15:05:28 2025-11-11 08:19:54
EXPLOITDB exploitdb_EDB-24031 2025-11-11 15:05:28 2025-11-11 08:19:54
EXPLOITDB exploitdb_EDB-24032 2025-11-11 15:05:28 2025-11-11 08:19:54
EXPLOITDB exploitdb_EDB-24033 2025-11-11 15:05:28 2025-11-11 08:19:54
EXPLOITDB exploitdb_EDB-276 2025-11-11 15:05:50 2025-11-11 08:23:39
EXPLOITDB exploitdb_EDB-291 2025-11-11 15:05:24 2025-11-11 08:24:44
EXPLOITDB exploitdb_EDB-942 2025-11-11 15:05:50 2025-11-11 09:06:30
版本与语言
当前版本: v10
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v10 EXPLOITDB
2025-11-11 17:06:30
references_count: 42 → 48; tags_count: 12 → 14
查看详细变更
  • references_count: 42 -> 48
  • tags_count: 12 -> 14
v9 EXPLOITDB
2025-11-11 16:24:44
references_count: 40 → 42; tags_count: 11 → 12
查看详细变更
  • references_count: 40 -> 42
  • tags_count: 11 -> 12
v8 EXPLOITDB
2025-11-11 16:23:39
references_count: 38 → 40; tags_count: 7 → 11
查看详细变更
  • references_count: 38 -> 40
  • tags_count: 7 -> 11
v7 EXPLOITDB
2025-11-11 16:19:54
references_count: 36 → 38; tags_count: 6 → 7
查看详细变更
  • references_count: 36 -> 38
  • tags_count: 6 -> 7
v6 EXPLOITDB
2025-11-11 16:19:54
references_count: 34 → 36; tags_count: 5 → 6
查看详细变更
  • references_count: 34 -> 36
  • tags_count: 5 -> 6
v5 EXPLOITDB
2025-11-11 16:19:54
references_count: 32 → 34; tags_count: 4 → 5
查看详细变更
  • references_count: 32 -> 34
  • tags_count: 4 -> 5
v4 EXPLOITDB
2025-11-11 16:19:54
references_count: 29 → 32; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 29 -> 32
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:54
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200408-159; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200408-159
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:07
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 39; references_count: 30 → 29; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 39
  • references_count: 30 -> 29
  • data_sources: ['cve'] -> ['cve', 'nvd']