CVE-2004-1060

Description

Multiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.

5.0
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 59.91% Top 5%
Vendor Advisory securityfocus.com Vendor Advisory cisco.com Vendor Advisory marc.info Vendor Advisory microsoft.com Vendor Advisory sco.com Vendor Advisory com.ar Vendor Advisory gov.uk
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A181 signature vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A196 signature vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A780 signature vdb entry
http://www.securityfocus.com/bid/13124 vdb entry
http://www.securityfocus.com/archive/1/418882/100/0/threaded vendor advisory
http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3826 signature vdb entry
http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A405 signature vdb entry
http://marc.info/?l=bugtraq&m=112861397904255&w=2 vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A899 signature vdb entry
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 vendor advisory
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt vendor advisory
http://secunia.com/advisories/18317 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2188 signature vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A651 signature vdb entry
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en vendor advisory
http://securityreason.com/securityalert/19 third party advisory
http://securityreason.com/securityalert/57 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5386 signature vdb entry

Frequently Asked Questions

What is the severity of CVE-2004-1060?
CVE-2004-1060 has been scored as a medium severity vulnerability.
How to fix CVE-2004-1060?
To fix CVE-2004-1060, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2004-1060 being actively exploited in the wild?
It is possible that CVE-2004-1060 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~60% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.