5
CVSSv2

CVE-2005-1184

Published: 02/05/2005 Updated: 30/04/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The TCP/IP stack in multiple operating systems allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2003 server enterprise

microsoft windows 2003 server standard

microsoft windows 2003 server standard_64-bit

microsoft windows nt 4.0

microsoft windows 2003 server r2

microsoft windows 98se

microsoft windows xp

microsoft windows 2003 server datacenter_64-bit

microsoft windows 2003 server enterprise_64-bit

microsoft windows 2003 server web

Exploits

source: wwwsecurityfocuscom/bid/13215/info Multiple Vendor TCP/IP stack implementations are reported prone to a denial of service vulnerability A report indicates that the vulnerability manifests when an erroneous TCP acknowledgement number is encountered in an active TCP session stream A successful attack may result in a degradation ...