CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2004-0230

First published: Wed May 05 2004(Updated: )

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Oracle Solaris and Zettabyte File System (ZFS)=10
Oracle Solaris and Zettabyte File System (ZFS)=11
Openpetra=2.6.2
McAfee Network Data Loss Prevention<=8.6
McAfee Network Data Loss Prevention=9.2.0
McAfee Network Data Loss Prevention=9.2.1
McAfee Network Data Loss Prevention=9.2.2
NetBSD current=1.5
NetBSD current=1.5.1
NetBSD current=1.5.2
NetBSD current=1.5.3
NetBSD current=1.6
NetBSD current=1.6.1
NetBSD current=1.6.2
NetBSD current=2.0
Xinuos OpenServer=5.0.6
Xinuos OpenServer=5.0.7
Juniper Junos
UnixWare ReliantHA=7.1.1
UnixWare ReliantHA=7.1.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2004-0230?

    CVE-2004-0230 is considered a moderate severity vulnerability due to its potential to cause denial of service on persistent TCP connections.

  • How do I fix CVE-2004-0230?

    To mitigate CVE-2004-0230, apply security patches provided by your software vendor or consider limiting the TCP window size.

  • Which software versions are affected by CVE-2004-0230?

    CVE-2004-0230 affects several versions including Oracle Solaris 10 and 11, OpenPGP 2.6.2, and specific releases of McAfee Network Data Loss Prevention.

  • What type of attack does CVE-2004-0230 facilitate?

    CVE-2004-0230 allows attackers to easily guess TCP sequence numbers and inject TCP RST packets, leading to connection loss.

  • Is CVE-2004-0230 a type of DDoS vulnerability?

    While CVE-2004-0230 can cause denial of service, it is typically exploited in targeted attacks rather than large-scale distributed denial of service (DDoS) attacks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203