Description
FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Product(s):
- FreeBSD 4.0
- FreeBSD 4.1.1
- FreeBSD 4.10
- FreeBSD 4.10 Patch 10
- FreeBSD 4.10 Patch 11
- FreeBSD 4.10 Patch 13
- FreeBSD 4.10 Patch 14
- FreeBSD 4.10 Patch 15
- FreeBSD 4.10 Patch 16
- FreeBSD 4.10 Patch 18
- FreeBSD 4.10 Patch 19
- FreeBSD 4.10 Patch 20
- FreeBSD 4.10 Patch 21
- FreeBSD 4.10 Patch 22
- FreeBSD 4.10 Patch 23
- FreeBSD 4.10 Patch 24
- FreeBSD 4.10 Patch 2
- FreeBSD 4.10 Patch 3
- FreeBSD 4.10 Patch 4
- FreeBSD 4.10 Patch 5
- FreeBSD 4.10 Patch 7
- FreeBSD 4.10 Patch 8
- FreeBSD 4.10 Patch 9
- FreeBSD 4.10 Release Candidate
- FreeBSD 4.11
- FreeBSD 4.11 Patch 10
- FreeBSD 4.11 Patch 11
- FreeBSD 4.11 Patch 12
- FreeBSD 4.11 Patch 13
- FreeBSD 4.11 Patch 14
- FreeBSD 4.11 Patch 15
- FreeBSD 4.11 Patch 16
- FreeBSD 4.11 Patch 17
- FreeBSD 4.11 Patch 18
- FreeBSD 4.11 Patch 19
- FreeBSD 4.11 Patch 1
- FreeBSD 4.11 Patch 20
- FreeBSD 4.11 Patch 21
- FreeBSD 4.11 Patch 22
- FreeBSD 4.11 Patch 24
- FreeBSD 4.11 Patch 25
- FreeBSD 4.11 Patch 26
- FreeBSD 4.11 Patch 2
- FreeBSD 4.11 Patch 3
- FreeBSD 4.11 Patch 4
- FreeBSD 4.11 Patch 5
- FreeBSD 4.11 Patch 6
- FreeBSD 4.11 Patch 8
- FreeBSD 4.11 Patch 9
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.4
- FreeBSD 4.4 Patch 27
- FreeBSD 4.4 Patch 41
- FreeBSD 4.4 Patch 42
- FreeBSD 4.4 Patch 44
- FreeBSD 4.4 Patch 45
- FreeBSD 4.4 Patch 46
- FreeBSD 4.4 Patch 47
- FreeBSD 4.4 Patch 4
- FreeBSD 4.4 Patch 8
- FreeBSD 4.5
- FreeBSD 4.5 Patch 1
- FreeBSD 4.5 Patch 20
- FreeBSD 4.5 Patch 31
- FreeBSD 4.5 Patch 32
- FreeBSD 4.5 Patch 34
- FreeBSD 4.5 Patch 35
- FreeBSD 4.5 Patch 36
- FreeBSD 4.5 Patch 37
- FreeBSD 4.6.2
- FreeBSD 4.6.2 Patch 22
- FreeBSD 4.6.2 Patch 26
- FreeBSD 4.6.2 Patch 27
- FreeBSD 4.6.2 Patch 2
- FreeBSD 4.6.2 Patch 8
- FreeBSD 4.6.2 Patch 9
- FreeBSD 4.6
- FreeBSD 4.6 Patch 11
- FreeBSD 4.6 Patch 12
- FreeBSD 4.6 Patch 16
- FreeBSD 4.6 Patch 19
- FreeBSD 4.6 Patch 20
- FreeBSD 4.6 Patch 23
- FreeBSD 4.6 Patch 24
- +175 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-2068, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-2068 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.