Vulnerability Details : CVE-2004-0791
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Vulnerability category: Denial of service
Threat overview for CVE-2004-0791
Top countries where our scanners detected CVE-2004-0791
Top open port discovered on systems with this issue
554
IPs affected by CVE-2004-0791 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-0791!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-0791
Probability of exploitation activity in the next 30 days: 60.83%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0791
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2004-0791
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112
- http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
- http://www.redhat.com/support/errata/RHSA-2005-017.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184
- http://marc.info/?l=bugtraq&m=112861397904255&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688
- http://www.securityfocus.com/archive/1/418882/100/0/threaded
- http://securityreason.com/securityalert/19
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt
-
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
Vendor Advisory
- http://www.securityfocus.com/archive/1/428028/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596
- http://www.securityfocus.com/archive/1/428058/100/0/threaded
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1
- http://securityreason.com/securityalert/57
- http://www.redhat.com/support/errata/RHSA-2005-016.html
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
Vendor Advisory
- http://www.securityfocus.com/bid/13124
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt
Products affected by CVE-2004-0791
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*