Blue Coat Systems Information for VU#637934
TCP does not adequately validate segments before updating timestamp value
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 30 Jun 2005
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Security Advisory: TCP Vulnerability CAN-2005-0356
June 28, 2005
Some Blue Coat Systems products are vulnerable to the attack described in CAN-2005-0356. This is a denial of service vulnerability that exists for TCP RFC 1323. The issue exists in the Protection Against Wrapped Sequence Numbers (PAWS) technique when TCP PAWS is configured to employ timestamp values.
A successful attack may result in a TCP connection to drop packets, resulting is a denial of service situation.
All OS Releases (CacheOS, SGOS)
Disable rfc-1323 support
#(config)tcp-ip rfc-1323 disable
#(config) reveal-advanced tcp-ip
#(config) tcp-ip no rfc-1323
For more information, please contact the Blue Coat Technical Support Department.
If you have feedback, comments, or additional information about this vulnerability, please send us email.