CVE-2005-2068
Published Jul 5, 2005
Last updated 16 years ago
Overview
- Description
- FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
- Source
- secteam@freebsd.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A585A1-FF82-418F-90F8-072458DB7816" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "582B9BF3-5BF1-44A3-A580-62F2D44FDD34" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAD73CDB-94C5-4DBF-8B4C-DD3E4E399445" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD85B1ED-1473-4C22-9E1E-53F07CF517E9" } ], "operator": "OR" } ] } ]