CVE-2004-0230
Juniper Junos < 11.4 - Denial of Service
Title source: ruleDescription
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by K-sPecial · perlremotemultiple
https://www.exploit-db.com/exploits/24033
exploitdb
WORKING POC
VERIFIED
by Paul A. Watson · cdoslinux
https://www.exploit-db.com/exploits/291
exploitdb
WRITEUP
VERIFIED
by Paul Watson · textremotemultiple
https://www.exploit-db.com/exploits/24032
exploitdb
WORKING POC
VERIFIED
by Paul A. Watson · perlremotemultiple
https://www.exploit-db.com/exploits/24031
exploitdb
WORKING POC
VERIFIED
by Matt Edman · cremotemultiple
https://www.exploit-db.com/exploits/24030
References (29)
... and 9 more
Scores
EPSS
0.0932
EPSS Percentile
92.8%
Details
Status
published
Products (13)
juniper/junos
11.4 (11 CPE variants)
juniper/junos
11.4r13 s2
juniper/junos
11.4x27
juniper/junos
12.1
juniper/junos
12.1r
juniper/junos
12.1x44 (7 CPE variants)
juniper/junos
12.1x45 (4 CPE variants)
juniper/junos
12.1x46 (3 CPE variants)
juniper/junos
12.1x47
juniper/junos
12.2 (8 CPE variants)
... and 3 more
Published
Aug 18, 2004
Tracked Since
Feb 18, 2026