{"vuid":"VU#972686","idnumber":"972686","name":"HP-UX ICMP vulnerable to DoS via ICMP Path Maximum Transmission Unit (PMTU) Discovery","keywords":["HP-UX","ICMP","PMTU Discovery","DoS","denial of service","ip_pmtu_strategy"],"overview":"A vulnerability in HP-UX may allow a remote attacker to cause a denial of service by sending a specially crafted ICMP packet.","clean_desc":"A number of widely accepted Internet standards describe different aspects of the relationships between the Internet Control Message Protocol (ICMP) and Transmission Control Protocol (TCP). In particular, RFC 1122 explains how TCP should respond to ICMP messages. Path MTU Discovery (RFC1191) is a method used to discover the maximum transmission unit (MTU) of an arbitrary internet path by using ICMP messages. HP-UX 11 contains an unspecified vulnerability in how it handles Path MTU Discovery messages. This may allow a remote attacker to cause a denial-of-service condition.","impact":"A remote unauthenticated attacker may be able to cause a denial of service by sending a specially crafted ICMP packet to any open TCP/IP connection. The denial of service can only be corrected by a reboot of the affected system.","resolution":"Apply a patch Apply a patch, as specified in HP Technical Document c00571568.","workarounds":"Set the PMTU Strategy Until patches are available, the denial of service may be avoided by setting the ip_pmtu_strategy parameter to 0 or 3, as specified in the HP Security Bulletin.","sysaffected":"","thanks":"Thanks to HP for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00571568","http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01137","http://www.securitytracker.com/alerts/2005/Apr/1013798.html","http://secunia.com/advisories/15123/"],"cveids":["CVE-2005-1192"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-26T13:18:01Z","publicdate":"2005-04-24T00:00:00Z","datefirstpublished":"2007-04-12T16:46:03Z","dateupdated":"2007-04-12T16:48:17Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"1","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"18","cam_impact":"6","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.05","cam_scorecurrentwidelyknown":"6.075","cam_scorecurrentwidelyknownexploited":"10.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.05,"vulnote":null}