Executive Summary

Informations
Name CVE-2005-0688 First vendor Publication 2005-03-05
Vendor Cve Last vendor Modification 2018-10-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0688

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1288
 
Oval ID: oval:org.mitre.oval:def:1288
Title: Win2k Land Vulnerability
Description: Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
Family: windows Class: vulnerability
Reference(s): CVE-2005-0688
Version: 5
Platform(s): Microsoft Windows 2000
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1685
 
Oval ID: oval:org.mitre.oval:def:1685
Title: WinXP Land Vulnerability
Description: Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
Family: windows Class: vulnerability
Reference(s): CVE-2005-0688
Version: 7
Platform(s): Microsoft Windows XP
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:482
 
Oval ID: oval:org.mitre.oval:def:482
Title: Spoofed Connection Request Vulnerability
Description: Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
Family: windows Class: vulnerability
Reference(s): CVE-2005-0688
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:4978
 
Oval ID: oval:org.mitre.oval:def:4978
Title: Server 2003 Object Management Vulnerability
Description: Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
Family: windows Class: vulnerability
Reference(s): CVE-2005-0688
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1

ExploitDB Exploits

id Description
2005-06-27 Stream / Raped Denial of Service Attack (win version)
2005-04-20 Multiple OS (Win32/Aix/Cisco) - Crafted ICMP Messages DoS Exploit

OpenVAS Exploits

Date Description
2012-03-01 Name : TCP Sequence Number Approximation Reset Denial of Service Vulnerability
File : nvt/secpod_tcp_sequence_approx_dos_vuln.nasl
2011-11-21 Name : Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerab...
File : nvt/secpod_ms_windows_ip_validation_code_exec_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
14578 Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)

Microsoft Windows contains a flaw that may allow a remote denial of service. The issue is triggered when sending a TCP packet with the SYN flag set and the same destination and source address and port, which causes the system to consume all available CPU resources, resulting in a loss of availability.

Snort® IPS/IDS

Date Description
2014-01-10 (decode)samesrc/dstIP
RuleID : 151 - Revision : 2 - Type :

Nessus® Vulnerability Scanner

Date Description
2006-10-10 Name : It is possible to crash the remote host due to a flaw in the TCP/IP IPv6 stack.
File : smb_nt_ms06-064.nasl - Type : ACT_GATHER_INFO
2005-04-12 Name : Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP...
File : smb_kb893066.nasl - Type : ACT_GATHER_INFO
2005-04-12 Name : Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP...
File : smb_nt_ms05-019.nasl - Type : ACT_GATHER_INFO
2004-04-25 Name : It was possible to send spoofed RST packets to the remote system.
File : tcp_seq_window.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BUGTRAQ http://marc.info/?l=bugtraq&m=111005099504081&w=2
HP http://www.securityfocus.com/archive/1/449179/100/0/threaded
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05...
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECUNIA http://secunia.com/advisories/22341
VUPEN http://www.vupen.com/english/advisories/2006/3983

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2021-05-04 12:02:50
  • Multiple Updates
2021-04-22 01:03:03
  • Multiple Updates
2020-12-09 21:23:56
  • Multiple Updates
2020-12-08 21:24:01
  • Multiple Updates
2020-05-23 00:16:24
  • Multiple Updates
2019-03-18 12:01:01
  • Multiple Updates
2018-10-19 21:19:37
  • Multiple Updates
2018-10-13 00:22:31
  • Multiple Updates
2017-10-11 09:23:29
  • Multiple Updates
2016-10-18 12:01:37
  • Multiple Updates
2016-04-26 13:20:19
  • Multiple Updates
2014-02-17 10:30:28
  • Multiple Updates
2013-05-11 11:22:23
  • Multiple Updates