var-200511-0294
Vulnerability from variot
Cisco PIX 6.3 and 7.0 allows remote attackers to cause a denial of service (blocked new connections) via spoofed TCP packets that cause the PIX to create embryonic connections that that would not produce a valid connection with the end system, including (1) SYN packets with invalid checksums, which do not result in a RST; or, from an external interface, (2) one byte of "meaningless data," or (3) a TTL that is one less than needed to reach the internal destination. Versions of Cisco PIX firewalls do not validate the checksum of transiting TCP packets. Attackers may be able to use this problem to create a sustained denial-of-service under certain conditions. Cisco PIX Firewall Is illegal TCP SYN When a packet is processed, the packet and source and destination information for a certain period of time (IP Address and port ) There is a function that rejects packets that match, and there is a vulnerability that prevents communication from a legitimate host if the source information of the wrong packet is spoofed by that of a legitimate host.From a specific source TCP Communication is interrupted for a certain period of time (DoS) It may be in a state. This issue allows attackers to temporarily block network traffic to arbitrarily targeted TCP services. By repeating the attack, a prolonged denial-of-service condition is possible. Cisco PIX is a hardware firewall solution. Remote attackers may use this loophole to cause a denial of service attack on legitimate access sources. So an attacker can send a specially crafted TCP packet with a wrong checksum, setting the source/destination IP and port to a legitimate host. Once the PIX firewall receives such a message, it cannot establish a new TCP session with the credentials specified in the malicious message. The default time is 2 minutes and 2 seconds, and then it will resume normal operation. Gavrilenko has reported a vulnerability in Cisco PIX, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to the firewall failing to verify the checksum of a TCP SYN packet before it is allowed through the firewall and a connection state is setup to track the half-open connection. Packets with incorrect checksum values will be silently discarded by the destination host without a RST reply. This causes the connection state to be held up to two minutes before it is cleared. In the meantime, legitimate SYN packets with the same protocol, IP addresses, and ports are discarded by the firewall.
Successful exploitation allows an attacker to prevent a host from establishing connections to another host through the firewall.
The vulnerability has been reported in PIX 6.3 and PIX/ASA 7.0.
SOLUTION: The vendor recommends the following workaround.
1) Issue the commands "clear xlate" or "clear local-host
2) Modify the default TCP embryonic connection timeout to a lower value. e.g. 10 seconds.
3) Configure TCP Intercept to allow PIX to proxy all TCP connection attempts originated from behind any firewall interface after the first connection. This will have a performance impact.
PROVIDED AND/OR DISCOVERED BY: Konstantin V. Gavrilenko, Arhont Ltd
ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038971.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038983.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200511-0294", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pix", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.3" }, { "model": "pix", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0" }, { "model": "pix/asa", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "7.0" }, { "model": "pix firewall", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "6.3" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.1.4" }, { "model": "pix os", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5350" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5256.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "525" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "520" }, { "model": "pix firewall 515e", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "515" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5060" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5010" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.3(133)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.109)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.102)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3(110)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.5(104)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.5" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4.101)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(1.200)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(9)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(7)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(6)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(3.210)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(4.206)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.4(8)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.4(7.202)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.4(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "pix firewall b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.6" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.6" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.7" } ], "sources": [ { "db": "CERT/CC", "id": "VU#853540" }, { "db": "BID", "id": "15525" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:pix:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:pix:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-3774" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Randy Ivener rivener@cisco.com Konstantin V. Gavrilenko mlists@arhont.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-314" } ], "trust": 0.6 }, "cve": "CVE-2005-3774", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2005-3774", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-14982", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-3774", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#853540", "trust": 0.8, "value": "4.59" }, { "author": "NVD", "id": "CVE-2005-3774", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200511-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-14982", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#853540" }, { "db": "VULHUB", "id": "VHN-14982" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX 6.3 and 7.0 allows remote attackers to cause a denial of service (blocked new connections) via spoofed TCP packets that cause the PIX to create embryonic connections that that would not produce a valid connection with the end system, including (1) SYN packets with invalid checksums, which do not result in a RST; or, from an external interface, (2) one byte of \"meaningless data,\" or (3) a TTL that is one less than needed to reach the internal destination. Versions of Cisco PIX firewalls do not validate the checksum of transiting TCP packets. Attackers may be able to use this problem to create a sustained denial-of-service under certain conditions. Cisco PIX Firewall Is illegal TCP SYN When a packet is processed, the packet and source and destination information for a certain period of time (IP Address and port ) There is a function that rejects packets that match, and there is a vulnerability that prevents communication from a legitimate host if the source information of the wrong packet is spoofed by that of a legitimate host.From a specific source TCP Communication is interrupted for a certain period of time (DoS) It may be in a state. \nThis issue allows attackers to temporarily block network traffic to arbitrarily targeted TCP services. By repeating the attack, a prolonged denial-of-service condition is possible. Cisco PIX is a hardware firewall solution. Remote attackers may use this loophole to cause a denial of service attack on legitimate access sources. So an attacker can send a specially crafted TCP packet with a wrong checksum, setting the source/destination IP and port to a legitimate host. Once the PIX firewall receives such a message, it cannot establish a new TCP session with the credentials specified in the malicious message. The default time is 2 minutes and 2 seconds, and then it will resume normal operation. Gavrilenko has reported a vulnerability in Cisco PIX,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to the firewall failing to verify the\nchecksum of a TCP SYN packet before it is allowed through the firewall\nand a connection state is setup to track the half-open connection. \nPackets with incorrect checksum values will be silently discarded by\nthe destination host without a RST reply. This causes the connection\nstate to be held up to two minutes before it is cleared. In the\nmeantime, legitimate SYN packets with the same protocol, IP\naddresses, and ports are discarded by the firewall. \n\nSuccessful exploitation allows an attacker to prevent a host from\nestablishing connections to another host through the firewall. \n\nThe vulnerability has been reported in PIX 6.3 and PIX/ASA 7.0. \n\nSOLUTION:\nThe vendor recommends the following workaround. \n\n1) Issue the commands \"clear xlate\" or \"clear local-host \u003cip address\non the higher security level interface\u003e\" to allow the firewall to\npass connections again. \n\n2) Modify the default TCP embryonic connection timeout to a lower\nvalue. e.g. 10 seconds. \n\n3) Configure TCP Intercept to allow PIX to proxy all TCP connection\nattempts originated from behind any firewall interface after the\nfirst connection. This will have a performance impact. \n\nPROVIDED AND/OR DISCOVERED BY:\nKonstantin V. Gavrilenko, Arhont Ltd\n\nORIGINAL ADVISORY:\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038971.html\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038983.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CERT/CC", "id": "VU#853540" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "BID", "id": "15525" }, { "db": "VULHUB", "id": "VHN-14982" }, { "db": "PACKETSTORM", "id": "41770" } ], "trust": 2.79 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-14982", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-14982" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "17670", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#853540", "trust": 3.3 }, { "db": "BID", "id": "15525", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2005-3774", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2005-2546", "trust": 1.7 }, { "db": "OSVDB", "id": "24140", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015256", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2005-000696", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200511-314", "trust": 0.7 }, { "db": "XF", "id": "25079", "trust": 0.6 }, { "db": "XF", "id": "25077", "trust": 0.6 }, { "db": "CISCO", "id": "20051128 RESPONSE TO CISCO PIX TCP CONNECTION PREVENTION", "trust": 0.6 }, { "db": "FULLDISC", "id": "20051122 CISCO PIX TCP CONNECTION PREVENTION", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20051122 CISCO PIX TCP CONNECTION PREVENTION", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060307 RE: CISCO PIX EMBRYONIC STATE MACHINE 1B DATA DOS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060307 CISCO PIX EMBRYONIC STATE MACHINE 1B DATA DOS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060307 CISCO PIX EMBRYONIC STATE MACHINE TTL(N-1) DOS", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "26548", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "1338", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-80179", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-14982", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41770", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#853540" }, { "db": "VULHUB", "id": "VHN-14982" }, { "db": "BID", "id": "15525" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "PACKETSTORM", "id": "41770" }, { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "id": "VAR-200511-0294", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-14982" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:53:36.321000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-response-20051122-pix", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-response-20051122-pix.shtml" }, { "title": "cisco-sr-20060307-pix", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060307-pix.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000696" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "NVD", "id": "CVE-2005-3774" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-november/038983.html" }, { "trust": 2.5, "url": "http://www.cisco.com/warp/public/707/cisco-response-20051122-pix.shtml" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/15525" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/853540" }, { "trust": 2.1, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-november/038971.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/17670/" }, { "trust": 1.7, "url": "http://www.cisco.com/en/us/products/hw/vpndevc/ps2030/products_security_notice09186a0080624a37.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/24140" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015256" }, { "trust": 1.7, "url": "http://secunia.com/advisories/17670" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2005/2546" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/417458/30/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/426989/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/426991/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/427041/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2005/2546" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25077" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25079" }, { "trust": 0.8, "url": "http://www.cisco.com/en/us/products/sw/secursw/ps2120/products_security_notice09186a008059a411.html" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/q-062.shtml" }, { "trust": 0.8, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-november/038971.html " }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3774" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-3774" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/25079" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/25077" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/427041/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/426991/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/426989/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/417458/30/0/threaded" }, { "trust": 0.3, "url": "http://seclists.org/lists/fulldisclosure/2006/mar/0146.html" }, { "trust": 0.3, "url": "/archive/1/426991" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6102/" }, { "trust": 0.1, "url": "http://secunia.com/product/56/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#853540" }, { "db": "VULHUB", "id": "VHN-14982" }, { "db": "BID", "id": "15525" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "PACKETSTORM", "id": "41770" }, { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#853540" }, { "db": "VULHUB", "id": "VHN-14982" }, { "db": "BID", "id": "15525" }, { "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "db": "PACKETSTORM", "id": "41770" }, { "db": "NVD", "id": "CVE-2005-3774" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-23T00:00:00", "db": "CERT/CC", "id": "VU#853540" }, { "date": "2005-11-23T00:00:00", "db": "VULHUB", "id": "VHN-14982" }, { "date": "2005-11-22T00:00:00", "db": "BID", "id": "15525" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "date": "2005-11-30T04:03:08", "db": "PACKETSTORM", "id": "41770" }, { "date": "2005-11-23T00:03:00", "db": "NVD", "id": "CVE-2005-3774" }, { "date": "2005-11-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-12-01T00:00:00", "db": "CERT/CC", "id": "VU#853540" }, { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-14982" }, { "date": "2006-03-10T01:15:00", "db": "BID", "id": "15525" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000696" }, { "date": "2018-10-19T15:39:04.887000", "db": "NVD", "id": "CVE-2005-3774" }, { "date": "2007-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX fails to verify TCP checksum", "sources": [ { "db": "CERT/CC", "id": "VU#853540" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "15525" }, { "db": "CNNVD", "id": "CNNVD-200511-314" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.