CVE-2004-0230

Juniper Junos < 11.4 - Denial of Service

Title source: rule

Description

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.

Exploits (7)

exploitdb WORKING POC VERIFIED
by K-sPecial · perlremotemultiple
https://www.exploit-db.com/exploits/24033
exploitdb WORKING POC VERIFIED
by Paul A. Watson · cdoslinux
https://www.exploit-db.com/exploits/291
exploitdb WORKING POC VERIFIED
by Aphex · doswindows
https://www.exploit-db.com/exploits/276
exploitdb WRITEUP VERIFIED
by Paul Watson · textremotemultiple
https://www.exploit-db.com/exploits/24032
exploitdb WORKING POC VERIFIED
by Paul A. Watson · perlremotemultiple
https://www.exploit-db.com/exploits/24031
exploitdb WORKING POC VERIFIED
by Matt Edman · cremotemultiple
https://www.exploit-db.com/exploits/24030
exploitdb WORKING POC
cdoswindows
https://www.exploit-db.com/exploits/942

References (29)

... and 9 more

Scores

EPSS 0.0932
EPSS Percentile 92.8%

Details

Status published
Products (13)
juniper/junos 11.4 (11 CPE variants)
juniper/junos 11.4r13 s2
juniper/junos 11.4x27
juniper/junos 12.1
juniper/junos 12.1r
juniper/junos 12.1x44 (7 CPE variants)
juniper/junos 12.1x45 (4 CPE variants)
juniper/junos 12.1x46 (3 CPE variants)
juniper/junos 12.1x47
juniper/junos 12.2 (8 CPE variants)
... and 3 more
Published Aug 18, 2004
Tracked Since Feb 18, 2026