Spectrum - ICMP Based TCP Reset Denial of Service Vulnerability
search cancel

Spectrum - ICMP Based TCP Reset Denial of Service Vulnerability

book

Article ID: 235503

calendar_today

Updated On:

Products

CA Spectrum

Issue/Introduction

We have identified a vulnerability in one of the Spectroserver. VA name is "ICMP Based TCP Reset Denial of Service Vulnerability":

Vulnerability Name CVE-ID QID Port Number Component Threat Impact
ICMP Based TCP Reset Denial of Service Vulnerability

CVE-2004-0790, CVE-2004-0791, CVE-2004-1060

82058   Spectroserver The target host is vulnerable to a denial of service condition. The TCP stack present on the host allows an ICMP hard-error packet to reset an established TCP connection that the packet identifies. An example ICMP hard error (defined in the IETF RFCs) is the ICMP message "fragmentation required, but Do-Not-Fragment bit is set". Since ICMP packets can be spoofed, attackers can exploit this issue by guessing the IP address and port numbers of a TCP connection established on the host, and then resetting these connections simply by sending an ICMP hard-error packet.

 

 

Environment

Spectrum 20.x

Resolution

Spectrum does not use any ICMP Source Quench messages for device communications. So, therefore it is not impacted by the vulnerabilities CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060.