TCP: RST Brute Force

This protocol anomaly is a large number of out-of-window RST packets. Excessive packets can indicate that an attacker is attempting to tear down connections within firewalls that do not correctly maintain TCP window sizes. In these attacks, typically the attacker also spoofs the source IP.

Extended Description

A vulnerability in TCP implementations may permit unauthorized remote users to reset TCP sessions. This issue affects products released by multiple vendors. Exploiting this issue may permit remote attackers to more easily approximate TCP sequence numbers. The problem is that affected implementations will accept TCP sequence numbers within a certain range of the expected sequence number for a packet in the session. This will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing denial-of-service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP and TCP port. Few factors may present viable target implementations, such as imlementations that: - depend on long-lived TCP connections - have known or easily guessed IP address endpoints - have known or easily guessed TCP source ports. Note that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack. As a result, this issue is likely to affect a number of routing platforms. Note also that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further. Other consequences may also result from this issue, such as injecting specific data in TCP sessions, but this has not been confirmed. **Update: Microsoft platforms are also reported prone to this vulnerability. Vendor reports indicate that an attacker will require knowledge of the IP address and port numbers of the source and destination of an existent legitimate TCP connection in order to exploit this vulnerability on Microsoft platforms. Connections that involve persistent sessions, for example Border Gateway Protocol sessions, may be more exposed to this vulnerability than other TCP/IP sessions.

Affected Products

Seil neu_atm,Ietf rfc_1323:_tcp_extensions_for_high_performance,Cisco call_manager

Short Name
TCP:C2S:EXPLOIT:RST-BRUTE-FORCE
Severity
Major
Recommended
False
Recommended Action
Drop Packet
Category
TCP
Keywords
CVE-2004-0230 CVE-2017-7285 bid:10183
Release Date
05/18/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Blue_coat_systems

Sco

Cisco

Check_point_software

Seil

Ietf

Juniper_networks

Hp

Avaya

Cray

Sgi

Netscreen

Symantec

Netbsd

Interniche

Microsoft

Ibm

CVSS Score

5.0

Found a potential security threat?