First published: Tue Apr 12 2005(Updated: )
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =10.0 | |
Oracle Solaris SPARC | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0791 has a severity rating that indicates a denial of service risk, affecting network throughput for TCP connections.
To fix CVE-2004-0791, it is recommended to apply the latest patches and updates provided by the affected software vendors.
CVE-2004-0791 affects multiple versions of SunOS and Oracle Solaris including versions 5.7, 5.8, 9.0, and 10.0.
CVE-2004-0791 involves a blind throughput-reduction attack using spoofed Source Quench packets.
The impact of CVE-2004-0791 on network performance can result in significant reduction in TCP connection throughput.