TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Project Subscriptions

Vendors Products
Juniper Subscribe
Network Data Loss Prevention Subscribe
Microsoft Subscribe
Windows 2000 Subscribe
Windows 98 Subscribe
Windows 98se Subscribe
Windows Server 2003 Subscribe
Windows Xp Subscribe
Openpgp Subscribe
Openpgp Subscribe
Solaris Subscribe
Openserver Subscribe
Unixware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc cve-icon cve-icon
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt cve-icon cve-icon
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt cve-icon cve-icon
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt cve-icon cve-icon
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc cve-icon cve-icon
http://kb.juniper.net/JSA10638 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=108302060014745&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=108506952116653&w=2 cve-icon cve-icon
http://secunia.com/advisories/11440 cve-icon cve-icon
http://secunia.com/advisories/11458 cve-icon cve-icon
http://secunia.com/advisories/22341 cve-icon cve-icon
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/415294 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html cve-icon cve-icon
http://www.osvdb.org/4030 cve-icon cve-icon
http://www.securityfocus.com/archive/1/449179/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/10183 cve-icon cve-icon
http://www.uniras.gov.uk/vuls/2004/236929/index.htm cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA04-111A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3983 cve-icon cve-icon
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 cve-icon cve-icon
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10053 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711 cve-icon cve-icon
History

Fri, 02 May 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows 2000
Microsoft windows 98
Microsoft windows 98se
Microsoft windows Server 2003
Microsoft windows Xp
CPEs cpe:2.3:o:juniper:junos:11.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4r13:s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4x27:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:d35:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x45:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x45:d10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x45:d15:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x45:d20:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x47:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:-:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 2000
Microsoft windows 98
Microsoft windows 98se
Microsoft windows Server 2003
Microsoft windows Xp

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:10:03.682Z

Reserved: 2004-03-17T05:00:00.000Z

Link: CVE-2004-0230

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2004-08-18T04:00:00.000

Modified: 2025-05-02T16:40:41.530

Link: CVE-2004-0230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses