CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit
Fortinet PSIRT Advisories
Fortinet PSIRT Contact:
Website: https://fortiguard.fortinet.com/faq/psirt-contact
FG-IR-16-039
Final
1
1
2020-05-20T00:00:00
Current version
2020-05-20T00:00:00
2020-05-20T00:00:00
TCP stacks that lack RFC 5961 3.2 & 4.2 support (or have it disabled at application level) may allow remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST or SYN packet.
Denial of service
FortiAnalyzer version 5.2.0 through 5.2.9 FortiAnalyzer version 6.0.0 through 6.0.11 FortiAnalyzer version 6.2.0 through 6.2.3 FortiAuthenticator version 5.5.0 FortiAuthenticator version 6.0.0 through 6.0.5 FortiAuthenticator version 6.2.0 through 6.2.1 FortiManager version 5.2.0 through 5.2.9 FortiManager version 6.0.0 through 6.0.11 FortiManager version 6.2.0 through 6.2.3 FortiOS version 5.2.0 through 5.2.8 FortiOS version 5.4.0 through 5.4.1 FortiWAN version 4.5.0 through 4.5.4 FortiWLC version 8.4.0 through 8.4.8 FortiWLC version 8.5.0 through 8.5.5 FortiWLC version 8.6.0
Upgrade to FortiAnalyzer version 6.2.4 or above Upgrade to FortiAnalyzer version 6.4.0 or above Upgrade to FortiAuthenticator version 6.3.0 or above Upgrade to FortiAuthenticator version 6.0.6 or above Upgrade to FortiManager version 6.2.4 or above Upgrade to FortiManager version 6.4.0 or above Upgrade to FortiOS version 5.6.0 or above Upgrade to FortiOS version 5.4.2 or above Upgrade to FortiOS version 5.2.9 or above Upgrade to FortiWAN version 4.5.5 or above Upgrade to FortiWLC version 8.6.1 or above Workaround: Restrict hosts that can connect to the GUI to trusted ones only, with the trusted host feature.
https://fortiguard.fortinet.com/psirt/FG-IR-16-039
CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit
The following issues reported by vulnerability scanners are directly linked to this issue: "TCP Sequence Number Approximation Based Denial of Service" "Blind Reset Attack Using the RST/SYN Bit"
The following issues reported by vulnerability scanners are directly linked to this issue: "TCP Sequence Number Approximation Based Denial of Service" "Blind Reset Attack Using the RST/SYN Bit"
FortiAnalyzer 6.2.3
FortiAnalyzer 6.2.2
FortiAnalyzer 6.2.1
FortiAnalyzer 6.2.0
FortiAnalyzer 6.0.11
FortiAnalyzer 6.0.10
FortiAnalyzer 6.0.9
FortiAnalyzer 6.0.8
FortiAnalyzer 6.0.7
FortiAnalyzer 6.0.6
FortiAnalyzer 6.0.5
FortiAnalyzer 6.0.4
FortiAnalyzer 6.0.3
FortiAnalyzer 6.0.2
FortiAnalyzer 6.0.1
FortiAnalyzer 6.0.0
FortiAnalyzer 5.2.9
FortiAnalyzer 5.2.8
FortiAnalyzer 5.2.7
FortiAnalyzer 5.2.6
FortiAnalyzer 5.2.5
FortiAnalyzer 5.2.4
FortiAnalyzer 5.2.3
FortiAnalyzer 5.2.2
FortiAnalyzer 5.2.1
FortiAnalyzer 5.2.0
FortiAuthenticator 6.2.2
FortiAuthenticator 6.2.1
FortiAuthenticator 6.2.0
FortiAuthenticator 6.0.5
FortiAuthenticator 6.0.4
FortiAuthenticator 6.0.3
FortiAuthenticator 6.0.2
FortiAuthenticator 6.0.1
FortiAuthenticator 6.0.0
FortiAuthenticator 5.5.0
FortiManager 6.2.3
FortiManager 6.2.2
FortiManager 6.2.1
FortiManager 6.2.0
FortiManager 6.0.11
FortiManager 6.0.10
FortiManager 6.0.9
FortiManager 6.0.8
FortiManager 6.0.7
FortiManager 6.0.6
FortiManager 6.0.5
FortiManager 6.0.4
FortiManager 6.0.3
FortiManager 6.0.2
FortiManager 6.0.1
FortiManager 6.0.0
FortiOS 6.0.2
FortiOS 5.4.1
FortiOS 5.4.0
FortiOS 5.2.8
FortiOS 5.2.7
FortiOS 5.2.6
FortiOS 5.2.5
FortiOS 5.2.4
FortiOS 5.2.3
FortiOS 5.2.2
FortiOS 5.2.1
FortiOS 5.2.0
FortiWAN 4.5.4
FortiWAN 4.5.3
FortiWAN 4.5.2
FortiWAN 4.5.1
FortiWAN 4.5.0
FortiWLC 8.6.0
FortiWLC 8.5.5
FortiWLC 8.5.4
FortiWLC 8.5.3
FortiWLC 8.5.2
FortiWLC 8.5.1
FortiWLC 8.5.0
FortiWLC 8.4.8
FortiWLC 8.4.7
FortiWLC 8.4.6
FortiWLC 8.4.5
FortiWLC 8.4.4
FortiWLC 8.4.2
FortiWLC 8.4.1
FortiWLC 8.4.0
CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit
CVE-2004-0230
FortiAnalyzer-6.2.3
FortiAnalyzer-6.2.2
FortiAnalyzer-6.2.1
FortiAnalyzer-6.2.0
FortiAnalyzer-6.0.11
FortiAnalyzer-6.0.10
FortiAnalyzer-6.0.9
FortiAnalyzer-6.0.8
FortiAnalyzer-6.0.7
FortiAnalyzer-6.0.6
FortiAnalyzer-6.0.5
FortiAnalyzer-6.0.4
FortiAnalyzer-6.0.3
FortiAnalyzer-6.0.2
FortiAnalyzer-6.0.1
FortiAnalyzer-6.0.0
FortiAnalyzer-5.2.9
FortiAnalyzer-5.2.8
FortiAnalyzer-5.2.7
FortiAnalyzer-5.2.6
FortiAnalyzer-5.2.5
FortiAnalyzer-5.2.4
FortiAnalyzer-5.2.3
FortiAnalyzer-5.2.2
FortiAnalyzer-5.2.1
FortiAnalyzer-5.2.0
FortiAuthenticator-6.2.2
FortiAuthenticator-6.2.1
FortiAuthenticator-6.2.0
FortiAuthenticator-6.0.5
FortiAuthenticator-6.0.4
FortiAuthenticator-6.0.3
FortiAuthenticator-6.0.2
FortiAuthenticator-6.0.1
FortiAuthenticator-6.0.0
FortiAuthenticator-5.5.0
FortiManager-6.2.3
FortiManager-6.2.2
FortiManager-6.2.1
FortiManager-6.2.0
FortiManager-6.0.11
FortiManager-6.0.10
FortiManager-6.0.9
FortiManager-6.0.8
FortiManager-6.0.7
FortiManager-6.0.6
FortiManager-6.0.5
FortiManager-6.0.4
FortiManager-6.0.3
FortiManager-6.0.2
FortiManager-6.0.1
FortiManager-6.0.0
FortiOS-6.0.2
FortiOS-5.4.1
FortiOS-5.4.0
FortiOS-5.2.8
FortiOS-5.2.7
FortiOS-5.2.6
FortiOS-5.2.5
FortiOS-5.2.4
FortiOS-5.2.3
FortiOS-5.2.2
FortiOS-5.2.1
FortiOS-5.2.0
FortiWAN-4.5.4
FortiWAN-4.5.3
FortiWAN-4.5.2
FortiWAN-4.5.1
FortiWAN-4.5.0
FortiWLC-8.6.0
FortiWLC-8.5.5
FortiWLC-8.5.4
FortiWLC-8.5.3
FortiWLC-8.5.2
FortiWLC-8.5.1
FortiWLC-8.5.0
FortiWLC-8.4.8
FortiWLC-8.4.7
FortiWLC-8.4.6
FortiWLC-8.4.5
FortiWLC-8.4.4
FortiWLC-8.4.2
FortiWLC-8.4.1
FortiWLC-8.4.0
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:X/RC:X
https://fortiguard.fortinet.com/psirt/FG-IR-16-039
CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit
Reference>
The following issues reported by vulnerability scanners are directly linked to this issue: "TCP Sequence Number Approximation Based Denial of Service" "Blind Reset Attack Using the RST/SYN Bit"
The following issues reported by vulnerability scanners are directly linked to this issue: "TCP Sequence Number Approximation Based Denial of Service" "Blind Reset Attack Using the RST/SYN Bit"