First published: Thu Jan 13 2005(Updated: )
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote attackers to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =2.8 | |
OpenBSD | =3.1 | |
OpenBSD | =3.3 | |
OpenBSD | =2.9 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.0 | |
OpenBSD | =2.7 | |
OpenBSD | =3.2 | |
OpenBSD | =2.4 | |
OpenBSD | =3.6 | |
OpenBSD | =3.0 | |
OpenBSD | =3.5 | |
OpenBSD | =2.6 | |
OpenBSD | =2.5 | |
OpenBSD | =2.3 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0740 is considered a denial of service vulnerability that could lead to a system panic.
To mitigate CVE-2005-0740, upgrading to the latest version of OpenBSD that addresses this vulnerability is recommended.
CVE-2005-0740 affects OpenBSD versions 2.0 through 3.6.
Yes, CVE-2005-0740 can be exploited remotely by attackers sending crafted TCP timestamp options.
If your system is affected by CVE-2005-0740, it could become unresponsive or crash due to the induced panic.