{"vuid":"VU#853540","idnumber":"853540","name":"Cisco PIX fails to verify TCP checksum","keywords":["Cisco","PIX","DoS","denial of service","checksum","TCP","SYN","firewall"],"overview":"Versions of Cisco PIX firewalls do not validate the checksum of transiting TCP packets. Attackers may be able to use this problem to create a sustained denial-of-service under certain conditions.","clean_desc":"Cisco PIX firewall systems are used to enforce site-specific network security policy. A problem related to a failure to validate the checksum information of TCP traffic by default may be used by remote, unauthenticated attackers to create a sustained denial-of-service against PIX-protected systems under certain conditions. This condition may occur when TCP SYN packets with malformed TCP checksums and spoofed source addresses and port values are sent to systems behind affected PIX firewalls. Since the PIX does not validate the TCP checksum by default, it allows such packets through, creating an embryonic connection entry to track the connection attempt to the destination from the spoofed source address and port. The target of the attack would silently drop malformed TCP SYN packets without sending TCP RST packets back to the PIX to remove the embryonic connection entry. Legitimate attempts to connect to PIX-protected systems may then be blocked for up to two minutes per attack (assuming default  embryonic connection timer settings). Note this attack would not affect established TCP connections. Exploit code has been made publicly available that may automate a sustained denial-of-service attack described above.","impact":"Valid TCP connection attempts originating from the spoofed source IP and source ports during a sustained attack may not be allowed through affected PIX firewalls.","resolution":"","workarounds":"Several workarounds are publicly described by Cisco: http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_security_notice09186a008059a411.html\nhttp://www.cisco.com/warp/public/707/cisco-response-20051122-pix.shtml","sysaffected":"","thanks":"","author":"This document was written by Jeff S Havrilla.","public":["http://www.cisco.com/warp/public/707/cisco-response-20051122-pix.shtml","http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_security_notice09186a008059a411.html","http://www.ciac.org/ciac/bulletins/q-062.shtml","http://secunia.com/advisories/17670/","http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038971.html","http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038983.html"],"cveids":["CVE-2005-3774"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-23T16:52:56Z","publicdate":"2005-11-22T00:00:00Z","datefirstpublished":"2005-11-23T22:30:00Z","dateupdated":"2005-12-01T00:58:26Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"10","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"18","cam_scorecurrent":"4.59","cam_scorecurrentwidelyknown":"9.99","cam_scorecurrentwidelyknownexploited":"15.39","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.59,"vulnote":null}