Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Updated: April 29, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
For customers in Japan, Allied Telesis K.K. which is a member of AT-Group has published a statement only for Japanese market. Please visit the following web sites. http://jvn.jp/niscc/532967/522154/index.html (Japanese) http://www.allied-telesis.co.jp/support/list/faq/vuls/vulsall.html (Japanese)
Notified: August 12, 2004 Updated: April 12, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en. Apple Mac OS X versions prior to 10.2 may be affected.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Check Point products are not vulnerable to this issue.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Clavister Firewall is itself not vulnerable to this class of attacks. It also attempts to protect clients against such attacks. Specifically: No ICMP errors are passed by default. They may however be allowed on a per-rule/service basis. The firewall's own TCP stack (used by internal processes and ALGs) does not listen ICMP errors at all. All sequence numbers are scrambled using a high quality random engine, making sequence number guessing harder. In the case of many-to-one (dynamic) NAT, source port numbers are allocated randomly, making source port number guessing harder. See draft-gont-tcpm-icmp-attacks-00 section 5.3 On not accepting ICMP errors: The method outlined in draft-gont-tcpm-icmp-attacks-00 section 5.2 (delaying the connection reset) results in behavior not too dissimilar. The difference simply lies in how many packets that get sent before the connection is failed. PMTU discovery problems that normally arise by not accepting ICMP errors by default are avoided by doing DF bit stripping by default.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Updated: April 12, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Updated: June 15, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 21, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Extreme Networks products running "Extremeware 7.x" software are vulnerable to this issue. Extreme Networks products running "Extremeware EXOS" software are not vulnerable. Workaround: Apply filter to block ICMP packets with specific type/code which can cause the attack.
Notified: August 12, 2004 Updated: May 03, 2005
Affected
F5 products BIG-IP 4.x and 9.x are vulnerable. Patches are being made ready. TrafficShield and FirePass are not vulnerable.
The vendor has not provided us with any further information regarding this vulnerability.
Further information is available in Secunia Advisory SA15205.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
CAN-2004-0790: A blind TCP connection reset by sending The Linux 2.4 and 2.6 kernels have always verified the TCP sequence number on ICMP errors. In addition Linux kernels will never abort a connection due to a received ICMP packet. All Fedora Core versions are therefore unaffected by this issue. CAN-2004-0791: A spoofing attack with ICMP type 4 header The Linux kernel since 2.6.9 and 2.4.28 has included a patch by Dave Miller to ignore ICMP Source Quench messages as recommended by Fernando Gont. Fedora Core 3 shipped with a 2.6.9 kernel which ignores ICMP Source Quench messages. Fedora Core 2 was updated to a 2.6.9 kernel in a November 2004 update and is therefore also unaffected by this issue. CAN-2004-1060: ICMP path MTU spoofing Linux 2.4 and 2.6 kernels verify the sequence number on ICMP errors, thus significantly mitigating this issue. This issue can also be mitigated by disabling pmtu discovery if not required (/proc/sys/net/ipv4/ip_no_pmtu_disc)
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: April 21, 2005
Not Affected
Fortinet does not have this problem.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Foundry's implementation of ICMP on its products is not vulnerable to this type of attack.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en, http://software.fujitsu.com/jp/security/niscc/niscc.html#222750-tcpicmp, and http://jvn.jp/niscc/532967/index.html (Japanese).
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Affected
SOURCE: Hewlett-Packard CompanySoftware Security Response Team x-ref:SSRT4884 HP is investigating the potential impact to HP's products. As further information becomes available HP will provide notice through standard security bulletin announcements. To report potential security vulnerabilities in HP software, send an E-mail message to security-alert@hp.com.
The vendor has not provided us with any further information regarding this vulnerability.
Please see HPSBUX01164/SSRT4884 (HP-UX) and HPSBTU01210/SSRT4743 (HP Tru64 UNIX).
Notified: August 12, 2004 Updated: September 08, 2005
Affected
[[VULNERABLE]
Hitachi GR2000/GR4000/GS4000/GS3000 are vulnerable to this issue. More details are available at
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en and http://jvn.jp/niscc/532967/index.html (Japanese).
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
The AIX Operating System is affected by the issues discussed in CERT Vulnerability note VU#222750 and NISCC vulnerability #432967. An advisory for this issue will be available via https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/securityalerts?OpenDocument&pathID= In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to http://app-06.www.ibm.com/servers/resourcelink and follow the steps for registration. All questions should be refferred to servsec@us.ibm.com.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Not Affected
We analyzed the potential threats discussed in the IETF draft draft-gont-tcpm-icmp-attacks-00.txt and observed that Intoto products are not vulnerable to the described denial of service (DoS) attacks.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: May 05, 2005
Affected
Juniper Networks M-series and T-series routers running software built prior to August 18, 2004, are susceptible to this vulnerability. Software built on or after that date disables processing of ICMP Source Quench messages, permits the user to disable Path MTU Discovery, and has additional verification enabled for PMTUD. The various forms of ICMP Unreachable messages are already ignored except during session establishment. Other Juniper Networks products are not susceptible to this vulnerability. Customers should visit the Juniper Networks Customer Service Center web-site for further information: http://www.juniper.net/customers/csc
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en and https://www.juniper.net/customers/csc.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 29, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Microsoft Security Bulletin MS05-019.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Not Affected
NEC Corporation products are not susceptible to this vulnerability. We continue to check our products. For more detail: http://www.sw.nec.co.jp/psirt/index.html (Japanese)
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 29, 2005
Affected
The Linux kernel TCP/IP implementation has always been verifying the TCP sequence number embedded into the ICMP packet, and Linux end hosts are thus not affected by this vulnerability. As for non-Linux machines protected by a netfilter/iptables firewall: netfilter/iptables did not implement TCP sequence number (aka window) tracking at all until linux-2.6.9. However, even in linux >= 2.6.9, the check for RELATED ICMP packets does not verify the tcp sequence number of the encapsulated packet. Implementation of such a check is scheduled for inclusion into the 2.6.11 linux kernel.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Juniper Networks M-series and T-series routers running certain releases of JUNOS software are susceptible to this vulnerability. Other Juniper Networks products are not susceptible to this vulnerability. Customers should visit the Juniper Networks Customer Service Center web-site for further information. http://www.juniper.net/customers/csc
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 11, 2005
Affected
The Data ONTAP operating system has historically implemented some, but not all, of the recommendations from http://www.ietf.org/internet-drafts/draft-gont-tcpm-icmp-attacks-03.txt NetApp has implemented the remaining recommendations under bug ID 138865. Customers may, as always, check bug status and download patches from http://now.netapp.com/
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 21, 2005
Unknown
NextHop Technologies software does not include a TCP/IP stack. Instead, it relies on third party TCP/IP stacks. As a result, NextHop software is not directly affected by this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: September 08, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Nortel Technical Bulletins 2005005697, 2005005700, and 2005005701 on the Nortel Securitiy Advisory Bulletins site.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 21, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see 027: RELIABILITY FIX: August 25, 2004 for OpenBSD 3.4 and 015: RELIABILITY FIX: August 25, 2004 for OpenBSD 3.5.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Updated: September 08, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en and the Security Headlines posted at the Polycom Security Center.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
Like most of TCP implementations, both product lines of Redback Networks, Subscriber Management System and SmartEdge Router Family are affected by this vulnerability. The fixes will be available on both platforms in upcoming releases. For further assistance regarding this topic contact the Redback Networks Technical Assistance Center (TAC). TAC is prepared to provide worldwide support for security workarounds that address this issue. The Redback domestic TAC number is (877) 733 2225 and International TAC phone number is 31-104987777. Redback TAC will provide detailed information to our worldwide systems engineers and focal engineers to assist customers in configuring these workarounds.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
CAN-2004-0790: A blind TCP connection reset Red Hat Enterprise Linux 2.1 and 3 kernels have always verified the TCP sequence number on ICMP errors. In addition Linux kernels will never abort a connection due to a received ICMP packet. All Red Hat Enterprise Linux versions are therefore unaffected by this issue. CAN-2004-0791: A spoofing attack with ICMP type 4 header Red Hat Enterprise Linux 2.1 and 3 kernels prior to January 2005 honour ICMP Source Quench messages, although the TCP sequence number is checked which substantially increases the amount of effort an attacker would need to be able to cause a sucessful attack. ICMP Source Quench messages were disabled completely by the following updates: http://rhn.redhat.com/errata/RHSA-2005-043.html http://rhn.redhat.com/errata/RHSA-2005-016.html http://rhn.redhat.com/errata/RHSA-2005-017.html CAN-2004-1060: ICMP path MTU spoofing Red Hat Enterprise Linux 2.1 and 3 kernels verify the sequence number on ICMP errors, thus significantly mitigating this issue. This issue can also be mitigated by disabling pmtu discovery if not required (/proc/sys/net/ipv4/ip_no_pmtu_disc)
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
SCO is aware of the issue and is working on a fix.
The vendor has not provided us with any further information regarding this vulnerability.
For UnixWare 7.1.4 the fix is included in maintenance pack 2: http://www.sco.com/support/update/download/release.php?rid=58
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Secure Computing has carefully analyzed the scenarios outlined in the Internet Draft, and has determined that the Sidewinder G2 responds appropriately in those situations. Some of the scenarios mentioned in this draft illustrate again the desirability of using carefully configured security appliances and using protocols such as IPsec.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Updated: May 03, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: May 03, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Not Affected
Stonesoft StoneGate Firewall and IPS products are not affected by these vulnerabilities.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
Sun is only marginally impacted by the issues described in Gont's ICMP Internet Draft as existing TCP connections will not be dropped. There may be a performance impact but no more or less than flooding any link or system with garbage messages will cause performance problems. Sun is issuing Sun Alert 57746 to further describe Sun's specific impact and details which will be available here: http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: May 03, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see SYM05-008.
Updated: April 29, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://jvn.jp/niscc/532967/index.html (Japanese).
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 11, 2005
Affected
All WatchGuard firewalls are impacted to some extent by Gont's findings. TCP sessions which terminate on or pass through the firewall are vulnerable to reset attacks when the attacker can guess the source and destination address and port combinations for that session. WatchGuard plans to address the issues raised by Gont's paper for all products in software releases currently scheduled for the Q2-Q3 2005 time frame. If you have further questions about this or any other security concern with WatchGuard products, please contact: Steve Fallin Director, Rapid Response Team WatchGuard Technologies http://www.watchguard.com steve.fallin@watchguard.com +1.206.521.8340
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
Notified: August 12, 2004 Updated: April 12, 2005
Affected
In all releases after VxWorks 5.3 a hard error does not result in TCP aborting the connection. The hard error code is saved by TCP. If the connection is dropped due to a timeout this error code is available to the application. Wind River Network Stack 2.0 already checks the ICMP sequence numbers. The release of VxWorks 6.0 and the MSP updates shipping in the fall of 2004 are based on this stack. Wind River is planning updates to the VxWorks 5.5 and 5.4 versions of the stack that will include the fix for ICMP. These updates are planned for 2005.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Updated: April 29, 2005
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://jvn.jp/niscc/532967/index.html (Japanese).
Notified: August 12, 2004 Updated: February 07, 2005
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.