ID

VAR-200411-0018


CVE

CVE-2004-0744


TITLE

Apple Mac OS X In Rose Attack Vulnerabilities that consume large amounts of system memory

Trust: 0.8

sources: JVNDB: JVNDB-2004-000290

DESCRIPTION

The TCP/IP Networking component in Mac OS X before 10.3.5 allows remote attackers to cause a denial of service (memory and resource consumption) via a "Rose Attack" that involves sending a subset of small IP fragments that do not form a complete, larger packet. Apple Mac OS X In TCP/IP In the implementation of a specific fragmented SYN There is a flaw in handling the packet. Therefore, the difference in fragment offsets in the datagram is excessively large SYN There is a problem that system resources are consumed excessively when a large number of packets are processed.By a third party CPU Excessive resource consumption or network operation disrupted service operation (DoS) There is a possibility of being put into a state. Apple has released Mac OS X 10.3.5. This release addresses a number of security vulnerabilities. The following new issues were reported: A remote vulnerability in the Apple Safari Web browser may allow a remote attacker to steal potentially sensitive form data. A denial-of-service vulnerability in the operating system may allow a remote attacker to disable network traffic. These issues have been addressed in Mac OS X 10.3.5. Individual BIDs will be created upon further analysis. There is an issue in the implementation of the Mac OS X TCP/IP stack, which can be exploited by a remote attacker to perform a denial of service attack on the system. TITLE: HP-UX TCP/IP "Rose Attack" Denial of Service Vulnerability SECUNIA ADVISORY ID: SA18082 VERIFY ADVISORY: http://secunia.com/advisories/18082/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: HP-UX 11.x http://secunia.com/product/138/ DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the handling of specially crafted IP fragments. This can be exploited by sending a sequence of specially crafted IP fragments to cause the system to use too much system resources, potentially resulting in DoS. This is commonly known as the "Rose Attack. The vulnerability has been reported in version B.11.00, B.11.04, B.11.11, and B.11.23 running TCP/IP. SOLUTION: Apply updates. http://www.hp.com/go/softwaredepot HP-UX B.11.00: Install PHNE_33395 or later, and run "sqmax 1000". HP-UX B.11.04: Install PHNE_33427 or later, and run "sqmax 1000". HP-UX B.11.11: Install PHNE_31091 or later, and run "sqmax 1000". HP-UX B.11.23: Install PHKL_31500. Alternatively, install IPF-HP revision A.03.05.10.02 or later. PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: HPSBUX02087 SSRT4728: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00579189 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2004-0744 // JVNDB: JVNDB-2004-000290 // BID: 10904 // VULHUB: VHN-9174 // PACKETSTORM: 42376

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.2.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.3.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.3.5

Trust: 0.3

sources: BID: 10904 // JVNDB: JVNDB-2004-000290 // CNNVD: CNNVD-200411-058 // NVD: CVE-2004-0744

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0744
value: MEDIUM

Trust: 1.0

NVD: CVE-2004-0744
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200411-058
value: MEDIUM

Trust: 0.6

VULHUB: VHN-9174
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-0744
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-9174
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-9174 // JVNDB: JVNDB-2004-000290 // CNNVD: CNNVD-200411-058 // NVD: CVE-2004-0744

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0744

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200411-058

TYPE

Unknown

Trust: 0.9

sources: BID: 10904 // CNNVD: CNNVD-200411-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2004-000290

PATCH

title:APPLE-SA-2004-08-09url:http://lists.apple.com/archives/Security-announce/2004/Aug/msg00000.html

Trust: 0.8

title:Mac OS X 10.3.5url:http://docs.info.apple.com/article.html?artnum=300667-en

Trust: 0.8

title:Mac OS X 10.3.5url:http://docs.info.apple.com/article.html?artnum=300667-ja

Trust: 0.8

sources: JVNDB: JVNDB-2004-000290

EXTERNAL IDS

db:NVDid:CVE-2004-0744

Trust: 2.8

db:AUSCERTid:ESB-2004.0498

Trust: 1.7

db:XFid:16946

Trust: 1.4

db:BIDid:10904

Trust: 1.1

db:SECUNIAid:18082

Trust: 0.9

db:BIDid:11258

Trust: 0.8

db:JVNDBid:JVNDB-2004-000290

Trust: 0.8

db:CNNVDid:CNNVD-200411-058

Trust: 0.7

db:APPLEid:APPLE-SA-2004-09-09

Trust: 0.6

db:BUGTRAQid:20040427 SOURCE CODE TO TEST IPV4 FRAGMENTATION --> THE ROSE ATTACK

Trust: 0.6

db:BUGTRAQid:20040331 IPV4 FRAGMENTATION --> THE ROSE ATTACK

Trust: 0.6

db:VULHUBid:VHN-9174

Trust: 0.1

db:PACKETSTORMid:42376

Trust: 0.1

sources: VULHUB: VHN-9174 // BID: 10904 // JVNDB: JVNDB-2004-000290 // PACKETSTORM: 42376 // CNNVD: CNNVD-200411-058 // NVD: CVE-2004-0744

REFERENCES

url:http://www.auscert.org.au/render.html?it=4291

Trust: 1.7

url:http://digital.net/~gandalf/rose_frag_attack_explained.txt

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/16946

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16946

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=108075899619193&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=108308604119618&w=2

Trust: 1.0

url:http://secunia.com/advisories/18082/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0744

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0744

Trust: 0.8

url:http://www.securityfocus.com/bid/11258

Trust: 0.8

url:http://www.securityfocus.com/bid/10904

Trust: 0.8

url:http://marc.theaimsgroup.com/?l=bugtraq&m=108308604119618&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=108075899619193&w=2

Trust: 0.6

url:http://www.apple.com/support/downloads/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=108075899619193&w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&m=108308604119618&w=2

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.hp.com/go/softwaredepot

Trust: 0.1

url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00579189

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/138/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-9174 // BID: 10904 // JVNDB: JVNDB-2004-000290 // PACKETSTORM: 42376 // CNNVD: CNNVD-200411-058 // NVD: CVE-2004-0744

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200411-058

SOURCES

db:VULHUBid:VHN-9174
db:BIDid:10904
db:JVNDBid:JVNDB-2004-000290
db:PACKETSTORMid:42376
db:CNNVDid:CNNVD-200411-058
db:NVDid:CVE-2004-0744

LAST UPDATE DATE

2024-08-14T12:33:53.614000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-9174date:2017-07-11T00:00:00
db:BIDid:10904date:2007-05-30T16:51:00
db:JVNDBid:JVNDB-2004-000290date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200411-058date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0744date:2017-07-11T01:30:26.073

SOURCES RELEASE DATE

db:VULHUBid:VHN-9174date:2004-11-23T00:00:00
db:BIDid:10904date:2004-08-09T00:00:00
db:JVNDBid:JVNDB-2004-000290date:2007-04-01T00:00:00
db:PACKETSTORMid:42376date:2005-12-16T20:41:53
db:CNNVDid:CNNVD-200411-058date:2004-08-10T00:00:00
db:NVDid:CVE-2004-0744date:2004-11-23T05:00:00