ID
VAR-E-200403-0269
CVE
cve_id: | CVE-2004-0171 | Trust: 0.3 |
TITLE
BSD Out Of Sequence Packets Remote Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
A problem in the handling of out-of-sequence packets has been identified in BSD variants such as FreeBSD and OpenBSD. Because of this, it may be possible for remote attackers to deny service to legitimate users of vulnerable systems.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | sgi | model: | irix | scope: | eq | version: | 6.5.25 | Trust: 0.3 |
vendor: | sgi | model: | irix | scope: | eq | version: | 6.5.24 | Trust: 0.3 |
vendor: | sgi | model: | irix | scope: | eq | version: | 6.5.23 | Trust: 0.3 |
vendor: | sgi | model: | irix | scope: | eq | version: | 6.5.22 | Trust: 0.3 |
vendor: | openbsd | model: | openbsd | scope: | eq | version: | 3.4 | Trust: 0.3 |
vendor: | openbsd | model: | openbsd | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.9 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.8 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.6.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.11 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.10 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.9 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.6.2 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | borderware | model: | firewall server | scope: | eq | version: | 7.0 | Trust: 0.3 |
EXPLOIT
It has been stated that exploits for this issue exist in the wild. However, there are currently no publicly available exploits.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Vulnerability discovery credited to Alexander Cuttergo.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2004-0171 | Trust: 0.3 |
db: | BID | id: | 9792 | Trust: 0.3 |
REFERENCES
url: | http://www.idefense.com/application/poi/display?id=78&type=vulnerabilities | Trust: 0.3 |
url: | http://www.borderware.com/products/firewall.php | Trust: 0.3 |
url: | http://www.borderware.com/ | Trust: 0.3 |
url: | http://www.openbsd.org | Trust: 0.3 |
url: | http://www.freebsd.org/ | Trust: 0.3 |
url: | http://docs.freebsd.org/cgi/getmsg.cgi?fetch=97407+0+/usr/local/www/db/text/2004/freebsd-net/20040222.freebsd-net | Trust: 0.3 |
SOURCES
db: | BID | id: | 9792 |
LAST UPDATE DATE
2022-07-27T09:39:28.719000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 9792 | date: | 2009-07-12T03:06:00 |
SOURCES RELEASE DATE
db: | BID | id: | 9792 | date: | 2004-03-02T00:00:00 |