The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote attackers to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
References
Link | Resource |
---|---|
http://secunia.com/advisories/13819 | |
http://securitytracker.com/id?1012861 | Patch Vendor Advisory |
http://www.openbsd.org/errata35.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/12250 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/13819 | |
http://securitytracker.com/id?1012861 | Patch Vendor Advisory |
http://www.openbsd.org/errata35.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/12250 | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/13819 - | |
References | () http://securitytracker.com/id?1012861 - Patch, Vendor Advisory | |
References | () http://www.openbsd.org/errata35.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/12250 - Exploit, Patch, Vendor Advisory |
Information
Published : 2005-01-13 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0740
Mitre link : CVE-2005-0740
CVE.ORG link : CVE-2005-0740
JSON object : View
Products Affected
openbsd
- openbsd
CWE