Executive Summary

Informations
Name CVE-2004-0791 First vendor Publication 2005-04-12
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10228
 
Oval ID: oval:org.mitre.oval:def:10228
Title: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1112
 
Oval ID: oval:org.mitre.oval:def:1112
Title: HP-UX 11.04 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:184
 
Oval ID: oval:org.mitre.oval:def:184
Title: HP-UX 11.11 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:464
 
Oval ID: oval:org.mitre.oval:def:464
Title: Solaris 8, 9, 10 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 6
Platform(s): Sun Solaris 8
Sun Solaris 9
Sun Solaris 10
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:596
 
Oval ID: oval:org.mitre.oval:def:596
Title: HP-UX 11.11 or 11.23 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:688
 
Oval ID: oval:org.mitre.oval:def:688
Title: HP-UX 11.23 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:726
 
Oval ID: oval:org.mitre.oval:def:726
Title: HP-UX 11.00 ICMP Source Quench Attack Vulnerability
Description: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0791
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 2

ExploitDB Exploits

id Description
2005-04-12 Multiple Vendor ICMP Message Handling DoS
2005-04-12 Multiple Vendor ICMP Implementation Malformed Path MTU DoS
2005-04-12 Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS
2005-04-20 Multiple OS (Win32/Aix/Cisco) - Crafted ICMP Messages DoS Exploit

Open Source Vulnerability Database (OSVDB)

Id Description
15618 Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS

Multiple ICMP implementations contains a flaw that may allow a remote denial of service. The issue is triggered due to the handling of ICMP error messages. By sending a specially crafted ICMP Source Quench packet, a remote attacker could arbitrary reduce the throughput of a TCP connection resulting in a loss of availability.

Snort® IPS/IDS

Date Description
2014-01-10 Source Quench
RuleID : 477 - Revision : 6 - Type : ICMP

Nessus® Vulnerability Scanner

Date Description
2017-05-08 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL23440942.nasl - Type : ACT_GATHER_INFO
2015-09-18 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL4583.nasl - Type : ACT_GATHER_INFO
2010-09-01 Name : The remote device is missing a vendor-supplied security patch
File : cisco-sa-20050412-icmp.nasl - Type : ACT_GATHER_INFO
2005-08-23 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_33427.nasl - Type : ACT_GATHER_INFO
2005-08-02 Name : The remote host is missing Sun Security Patch number 118844-20
File : solaris10_x86_118844.nasl - Type : ACT_GATHER_INFO
2005-08-01 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_32606.nasl - Type : ACT_GATHER_INFO
2005-08-01 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_33395.nasl - Type : ACT_GATHER_INFO
2005-07-05 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_33159.nasl - Type : ACT_GATHER_INFO
2005-05-30 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_26076.nasl - Type : ACT_GATHER_INFO
2005-05-30 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_26125.nasl - Type : ACT_GATHER_INFO
2005-02-16 Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_25644.nasl - Type : ACT_GATHER_INFO
2005-01-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-016.nasl - Type : ACT_GATHER_INFO
2005-01-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-043.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/13124
FEDORA http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
HP http://marc.info/?l=bugtraq&m=112861397904255&w=2
http://www.securityfocus.com/archive/1/418882/100/0/threaded
MISC http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://www.redhat.com/support/errata/RHSA-2005-043.html
SCO ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt
SECUNIA http://secunia.com/advisories/18317
SREASON http://securityreason.com/securityalert/19
http://securityreason.com/securityalert/57
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Date Informations
2021-05-04 12:02:24
  • Multiple Updates
2021-04-22 01:02:33
  • Multiple Updates
2020-05-23 00:15:52
  • Multiple Updates
2019-03-19 12:01:41
  • Multiple Updates
2018-10-31 00:19:43
  • Multiple Updates
2018-10-19 21:19:36
  • Multiple Updates
2017-10-11 09:23:23
  • Multiple Updates
2017-05-09 13:20:53
  • Multiple Updates
2016-10-18 12:01:22
  • Multiple Updates
2016-06-28 15:06:12
  • Multiple Updates
2016-04-26 12:53:11
  • Multiple Updates
2016-04-05 13:25:36
  • Multiple Updates
2015-09-19 13:23:21
  • Multiple Updates
2014-02-17 10:27:58
  • Multiple Updates
2014-01-19 21:22:17
  • Multiple Updates
2013-07-15 13:18:36
  • Multiple Updates
2013-05-11 11:42:59
  • Multiple Updates