CVE-2005-0960
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:47:48
NMCOS    

[原文]Multiple vulnerabilities in the SACK functionality in (1) tcp_input.c and (2) tcp_usrreq.c OpenBSD 3.5 and 3.6 allow remote attackers to cause a denial of service (memory exhaustion or system crash).


[CNNVD]OpenBSD TCP Stack远程拒绝服务漏洞(CNNVD-200505-298)

        OpenBSD 3.5和3.6的(1)tcp_input.c和(2)tcp_usrreq.c的SACK函数中存在多个漏洞,远程攻击者可以引起拒绝服务(内存耗竭或系统崩溃)攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:openbsd:openbsd:3.6OpenBSD 3.6
cpe:/o:openbsd:openbsd:3.5OpenBSD 3.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0960
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0960
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-298
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/12951
(PATCH)  BID  12951
http://www.openbsd.org/errata35.html#sack
(PATCH)  OPENBSD  20050330 [3.5] 030: RELIABILITY FIX: March 30, 2005
http://www.openbsd.org/errata.html#sack
(PATCH)  OPENBSD  20050330 [3.6] 013: RELIABILITY FIX: March 30, 2005
http://securitytracker.com/id?1013611
(PATCH)  SECTRACK  1013611

- 漏洞信息

OpenBSD TCP Stack远程拒绝服务漏洞
中危 其他
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        OpenBSD 3.5和3.6的(1)tcp_input.c和(2)tcp_usrreq.c的SACK函数中存在多个漏洞,远程攻击者可以引起拒绝服务(内存耗竭或系统崩溃)攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/030_sack.patch

- 漏洞信息

15191
OpenBSD TCP Malformed SACK Option DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

OpenBSD contains a flaw that may allow a remote denial of service. The issue is triggered when TCP segments with invalid SACK options are received, and will result in loss of availability for the platform.

- 时间线

2005-03-30 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, OpenBSD has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

OpenBSD TCP Stack Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 12951
Yes No
2005-03-31 12:00:00 2009-07-12 11:56:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

OpenBSD OpenBSD 3.6
OpenBSD OpenBSD 3.5

- 漏洞讨论

A remote denial of service vulnerability affects the OpenBSD operating system. This issue is due to implementation errors in the TCP stack, causing it to fail on malicious requests.

A remote attacker may leverage this issue to cause an affected computer to exhaust memory or crash, denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released a patch dealing with this issue.


OpenBSD OpenBSD 3.5

OpenBSD OpenBSD 3.6

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站