CVE-2005-0356

NameCVE-2005-0356
DescriptionMultiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-source-2.4.27source(unstable)(not affected)
kfreebsd5-sourcesource(unstable)5.3-15medium
linux-2.6source(unstable)(not affected)

Notes

- linux-2.6 <not-affected> (Linux is not vulnerable, see #310804)
- kernel-source-2.4.27 <not-affected> (Linux is not vulnerable, see #310804)

Search for package or bug name: Reporting problems