Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Embedded Server/Appliance)  >   Blue Coat ProxySG Vendors:   Blue Coat Systems
Blue Coat ProxySG TCP Stack PAWS Timestamp Implementation Lets Remote Users Deny Service
SecurityTracker Alert ID:  1014322
SecurityTracker URL:
CVE Reference:   CVE-2005-0356   (Links to External Site)
Date:  Jun 29 2005
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): SGOS prior to 3.2.5 and 4.1.2
Description:   A vulnerability was reported in the Blue Coat Systems ProxySG appliances in the TCP implementation. A remote user can cause denial of service conditions.

The TCP Protection Against Wrapped Sequence Numbers (PAWS) timestamps option implementation allows a remote user to send a spoofed packet with a large timer value to cause the target system to interpret subsequent packets asing being too old and, as a result, discarding the packets. A remote user can exploit this to cause TCP connections being processed by the ProxySG appliance to be reset.

Impact:   A remote user can cause TCP connections being processed by the ProxySG appliance to be reset.
Solution:   The vendor has issued fixed versions (SG3.2.5, SG4.1.2).

As a workaround, the vendor indicates that you can disable RFC-1323 support. For instructions, see the vendor's advisory at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC