Unknown
CVE-2005-0356
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- 7220 wlan access point,
- 7250 wlan access point,
- agent desktop,
- aironet ap1200,
- aironet ap350,
- alaxala ax,
- alaxala networks ax5400s,
- alaxala networks ax7800r,
- alaxala networks ax7800s,
- business communications manager 1000,
- business communications manager 200,
- business communications manager 400,
- call manager 1.0,
- call manager 2.0,
- call manager 3.0,
- call manager 3.1,
- call manager 3.1(2),
- call manager 3.1(3a),
- call manager 3.2,
- call manager 3.3,
- call manager 3.3(3),
- call manager 4.0,
- callpilot 200i,
- callpilot 201i,
- callpilot 702t,
- callpilot 703t,
- ciscoworks 1105 hosting solution engine,
- ciscoworks 1105 wireless lan solution engine,
- ciscoworks access control list manager 1.5,
- ciscoworks access control list manager 1.6,
- ciscoworks cd1 1st,
- ciscoworks cd1 2nd,
- ciscoworks cd1 3rd,
- ciscoworks cd1 4th,
- ciscoworks cd1 5th,
- ciscoworks common management foundation 2.0,
- ciscoworks common management foundation 2.1,
- ciscoworks common management foundation 2.2,
- ciscoworks common services 2.2,
- ciscoworks lms 1.3,
- ciscoworks vpn security management solution,
- ciscoworks windows,
- ciscoworks windows wug,
- conference connection 1.1(1),
- conference connection 1.2,
- contact center,
- content services switch 11000,
- content services switch 11050,
- content services switch 11150,
- content services switch 11500,
- content services switch 11501,
- content services switch 11503,
- content services switch 11506,
- content services switch 11800,
- e-mail manager,
- emergency responder 1.1,
- ethernet routing switch 1612,
- ethernet routing switch 1624,
- ethernet routing switch 1648,
- freebsd 1.1.5.1,
- freebsd 2.0,
- freebsd 2.0.5,
- freebsd 2.1.0,
- freebsd 2.1.5,
- freebsd 2.1.6,
- freebsd 2.1.6.1,
- freebsd 2.1.7.1,
- freebsd 2.2,
- freebsd 2.2.2,
- freebsd 2.2.3,
- freebsd 2.2.4,
- freebsd 2.2.5,
- freebsd 2.2.6,
- freebsd 2.2.8,
- freebsd 3.0,
- freebsd 3.1,
- freebsd 3.2,
- freebsd 3.3,
- freebsd 3.4,
- freebsd 3.5,
- freebsd 3.5.1,
- freebsd 4.0,
- freebsd 4.1,
- freebsd 4.1.1,
- freebsd 4.10,
- freebsd 4.11,
- freebsd 4.2,
- freebsd 4.3,
- freebsd 4.4,
- freebsd 4.5,
- freebsd 4.6,
- freebsd 4.6.2,
- freebsd 4.7,
- freebsd 4.8,
- freebsd 4.9,
- freebsd 5.0,
- freebsd 5.1,
- freebsd 5.2,
- freebsd 5.2.1,
- freebsd 5.3,
- freebsd 5.4,
- gr3000,
- gr4000,
- gs4000,
- intelligent contact manager 5.0,
- interactive voice response,
- ip contact center enterprise,
- ip contact center express,
- meetingplace,
- mgx 8230 1.2.10,
- mgx 8230 1.2.11,
- mgx 8250 1.2.10,
- mgx 8250 1.2.11,
- openbsd 3.0,
- openbsd 3.1,
- openbsd 3.2,
- openbsd 3.3,
- openbsd 3.4,
- openbsd 3.5,
- openbsd 3.6,
- optical metro 5000,
- optical metro 5100,
- optical metro 5200,
- personal assistant 1.3(1),
- personal assistant 1.3(2),
- personal assistant 1.3(3),
- personal assistant 1.3(4),
- personal assistant 1.4(1),
- personal assistant 1.4(2),
- remote monitoring suite option,
- rt105,
- rt250i,
- rt300i,
- rt57i,
- rtv700,
- rtx1000,
- rtx1100,
- rtx1500,
- rtx2000,
- secure access control server 2.0,
- secure access control server 2.1,
- secure access control server 2.3,
- secure access control server 2.3.5.1,
- secure access control server 2.3.6.1,
- secure access control server 2.4,
- secure access control server 2.42,
- secure access control server 2.5,
- secure access control server 2.6,
- secure access control server 2.6.2,
- secure access control server 2.6.3,
- secure access control server 2.6.4,
- secure access control server 3.0,
- secure access control server 3.0.1,
- secure access control server 3.0.3,
- secure access control server 3.1,
- secure access control server 3.1.1,
- secure access control server 3.2,
- secure access control server 3.2(1),
- secure access control server 3.2(1.20),
- secure access control server 3.2(2),
- secure access control server 3.2(3),
- secure access control server 3.2.1,
- secure access control server 3.2.2,
- secure access control server 3.3,
- secure access control server 3.3(1),
- secure access control server 3.3.1,
- secure access control server 3.3.2,
- sn 5420 storage router,
- sn 5420 storage router firmware 1.1(2),
- sn 5420 storage router firmware 1.1(3),
- sn 5420 storage router firmware 1.1(4),
- sn 5420 storage router firmware 1.1(5),
- sn 5420 storage router firmware 1.1(7),
- sn 5420 storage router firmware 1.1.3,
- sn 5428 storage router 2-3.3.1-k9,
- sn 5428 storage router 2-3.3.2-k9,
- sn 5428 storage router 2.5.1-k9,
- sn 5428 storage router 3.2.1-k9,
- sn 5428 storage router 3.2.2-k9,
- sn 5428 storage router 3.3.1-k9,
- sn 5428 storage router 3.3.2-k9,
- succession communication server 1000,
- support tools,
- survivable remote gateway 1.0,
- tmos 4.0,
- tmos 4.2,
- tmos 4.3,
- tmos 4.4,
- tmos 4.5,
- tmos 4.5.10,
- tmos 4.5.11,
- tmos 4.5.12,
- tmos 4.5.6,
- tmos 4.5.9,
- tmos 4.6,
- tmos 4.6.2,
- tmos 9.0,
- tmos 9.0.1,
- tmos 9.0.2,
- tmos 9.0.3,
- tmos 9.0.4,
- tmos 9.0.5,
- unity server 2.0,
- unity server 2.1,
- unity server 2.2,
- unity server 2.3,
- unity server 2.4,
- unity server 2.46,
- unity server 3.0,
- unity server 3.1,
- unity server 3.2,
- unity server 3.3,
- unity server 4.0,
- universal signaling point 5200,
- universal signaling point compact lite,
- web collaboration option,
- webns 7.10 (05.07)s,
- webns 7.20 (03.09)s,
- webns 7.20 (03.10)s,
- webns 7.30 (00.08)s,
- webns 7.30 (00.09)s,
- windows 2000,
- windows 2003 server enterprise,
- windows 2003 server enterprise 64-bit,
- windows 2003 server r2,
- windows 2003 server standard,
- windows 2003 server standard 64-bit,
- windows 2003 server web,
- windows xp
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: