CVE-2000-0289
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2000-03-27 CVE Published
- 2000-04-26 CVE Reserved
- 2024-02-08 EPSS Updated
- 2024-08-08 CVE Updated
- 2024-08-08 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html | 2024-08-08 | |
http://www.securityfocus.com/bid/1078 | 2024-08-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.novell.com/linux/security/advisories/suse_security_announce_48.html | 2008-09-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 2.1 Search vendor "Debian" for product "Debian Linux" and version "2.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 2.2 Search vendor "Debian" for product "Debian Linux" and version "2.2" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 2.2 Search vendor "Debian" for product "Debian Linux" and version "2.2" | pre_potato |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.2.10 Search vendor "Linux" for product "Linux Kernel" and version "2.2.10" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.2.12 Search vendor "Linux" for product "Linux Kernel" and version "2.2.12" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.2.14 Search vendor "Linux" for product "Linux Kernel" and version "2.2.14" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.0 Search vendor "Redhat" for product "Linux" and version "6.0" | alpha |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.0 Search vendor "Redhat" for product "Linux" and version "6.0" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.0 Search vendor "Redhat" for product "Linux" and version "6.0" | sparc |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.1 Search vendor "Redhat" for product "Linux" and version "6.1" | alpha |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.1 Search vendor "Redhat" for product "Linux" and version "6.1" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.1 Search vendor "Redhat" for product "Linux" and version "6.1" | sparc |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 6.2 Search vendor "Redhat" for product "Linux" and version "6.2" | i386 |
Affected
|