First published: Tue Apr 19 2005(Updated: )
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows Server 2003 | =web | |
Microsoft Windows Server 2003 | =enterprise | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows Server 2003 | =enterprise_64-bit | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows Server 2003 | =standard_64-bit | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows Server 2003 | =datacenter_64-bit-sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows 98 | ||
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows Server 2003 | =r2-sp1 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows Server 2003 | =enterprise_64-bit-sp1 | |
Microsoft Windows Server 2003 | =r2 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows Server 2003 | =web-sp1 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows Server 2003 | =standard-sp1 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows Server 2003 | =enterprise-sp1 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows Server 2003 | =standard | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows Server 2003 | =r2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1184 is a medium severity vulnerability that may lead to denial of service due to excessive CPU consumption.
To fix CVE-2005-1184, apply available patches or updates from the affected operating system vendors.
CVE-2005-1184 affects multiple Microsoft operating systems, including Windows NT 4.0, Windows XP, and Windows Server 2003.
CVE-2005-1184 can be exploited through a specifically crafted TCP packet that causes a denial of service.
While CVE-2005-1184 primarily affects older systems, it may still pose a risk if those systems are in use and not adequately secured.