Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-0356

6 documents6 sources
Severity
5.0MEDIUM
EPSS
81.5%
top 0.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 31
Latest updateMay 3

Description

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages26 packages

NVDcisco/conference_connection1.1\(1\), 1.2+1
NVDf5/tmos18 versions+17
NVDcisco/webns5 versions+4

Also affects: Freebsd 1.1.5.1, 2.0, 2.0.5, 2.1.0, 2.1.5, 2.1.6, 2.1.6.1, 2.1.7.1, 2.2, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.8, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.5.1, 4.0, 4.1, 4.1.1, 4.10, 4.11, 4.2, 4.3, 4.4, 4.5, 4.6, 4.6.2, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.2.1, 5.3, 5.4

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r6gj-g9qf-3c55: Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to caus2022-05-03
CVEList
CVE-2005-0356: Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to caus2005-05-31

💥Exploits & PoCs

1
Exploit-DB
TCP TIMESTAMPS - Denial of Service2005-05-21

📋Vendor Advisories

1
Red Hat
CVE-2005-0356: Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to caus