First published: Mon Mar 15 2004(Updated: )
FreeBSD 5.1 and earlier, and Mac OS X before 10.3.4, allows remote attackers to cause a denial of service (resource exhaustion of memory buffers and system crash) via a large number of out-of-sequence TCP packets, which prevents the operating system from creating new connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.6.2 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.2 | |
OpenBSD | =3.3 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0171 has a severity level that indicates it can lead to a denial of service by exploiting resource exhaustion.
To fix CVE-2004-0171, upgrade FreeBSD to version 5.3 or later and ensure OpenBSD is updated to 3.4 or later.
CVE-2004-0171 affects FreeBSD versions 4.6.2 to 5.2 and OpenBSD versions 3.3 and 3.4.
CVE-2004-0171 describes an attack that utilizes a large number of out-of-sequence TCP packets to exhaust memory resources.
Yes, CVE-2004-0171 is considered a historical vulnerability as it pertains to older operating system versions no longer widely in use.