First published: Wed Nov 23 2005(Updated: )
Cisco PIX 6.3 and 7.0 allows remote attackers to cause a denial of service (blocked new connections) via spoofed TCP packets that cause the PIX to create embryonic connections that that would not produce a valid connection with the end system, including (1) SYN packets with invalid checksums, which do not result in a RST; or, from an external interface, (2) one byte of "meaningless data," or (3) a TTL that is one less than needed to reach the internal destination.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =6.3 | |
Cisco PIX Firewall | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3774 is classified as a high-severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2005-3774, upgrade to Cisco PIX versions 7.1 or above, which address this vulnerability.
CVE-2005-3774 affects Cisco PIX versions 6.3 and 7.0.
CVE-2005-3774 enables remote attackers to block new connections by exploiting spoofed TCP packets.
CVE-2005-3774 causes a denial of service by creating embryonic connections from malformed SYN packets.