Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-4609 | First vendor Publication | 2008-10-20 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4609 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-16 | Configuration |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18890 | |||
Oval ID: | oval:org.mitre.oval:def:18890 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4609 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-09-10 | Name : Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability... File : nvt/secpod_ms09-046.nasl |
2009-09-10 | Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723) File : nvt/secpod_ms09-048.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62144 | F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St... |
61133 | Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC... |
59482 | Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation... |
58614 | McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio... |
58321 | Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati... |
58189 | Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC... |
57993 | Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem... |
57795 | Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State... |
57794 | Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl... |
57793 | Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta... |
50286 | Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-09-10 | IAVM : 2009-A-0077 - Multiple Microsoft TCP/IP Remote Code Execution Vulnerabilities Severity : Category I - VMSKEY : V0019917 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows TCP stack zero window size exploit attempt RuleID : 16294 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | TCP window closed before receiving data RuleID : 15912 - Revision : 10 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO |
2009-09-08 | Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d... File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:13:15 |
|
2024-11-28 12:16:45 |
|
2024-08-02 12:09:58 |
|
2024-08-02 01:02:49 |
|
2024-02-02 01:09:31 |
|
2024-02-01 12:02:48 |
|
2023-09-05 12:08:53 |
|
2023-09-05 01:02:39 |
|
2023-09-02 12:08:59 |
|
2023-09-02 01:02:40 |
|
2023-08-12 12:10:36 |
|
2023-08-12 01:02:40 |
|
2023-08-11 12:09:02 |
|
2023-08-11 01:02:45 |
|
2023-08-06 12:08:39 |
|
2023-08-06 01:02:41 |
|
2023-08-04 12:08:45 |
|
2023-08-04 01:02:44 |
|
2023-07-14 12:08:44 |
|
2023-07-14 01:02:41 |
|
2023-03-29 01:09:55 |
|
2023-03-28 12:02:47 |
|
2022-12-14 21:27:57 |
|
2022-10-11 12:07:45 |
|
2022-10-11 01:02:31 |
|
2021-07-07 21:23:26 |
|
2021-05-04 12:08:12 |
|
2021-04-22 01:08:32 |
|
2020-05-23 00:22:25 |
|
2019-05-09 12:02:35 |
|
2019-04-30 21:19:20 |
|
2019-04-30 17:19:08 |
|
2019-03-19 12:02:54 |
|
2018-10-31 00:19:54 |
|
2018-10-13 00:22:44 |
|
2017-09-29 09:23:46 |
|
2016-06-28 17:19:13 |
|
2016-04-26 17:55:45 |
|
2014-10-11 13:26:01 |
|
2014-02-17 10:46:58 |
|
2014-01-19 21:25:20 |
|
2013-10-11 13:23:02 |
|
2013-05-11 00:28:44 |
|