CVE-2004-0791

N/A Unknown
Published: April 12, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=112861397904255&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18317
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/19
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/57
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-017.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-043.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/418882/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/428028/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/428058/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/13124
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

48 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
30.4%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

sun