CVE-2003-0244
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
La implementación de la caché de ruta en Linux 2.4 y el módulo Netfilter IP conntrack permite que atacantes remotos provoquen una denegación de servicio (agotamiento de CPU) mediante paquetes con una dirección fuente alterada (lo que causa un elevado número de colisiones de tabla hash relacionadas con la cadena PREROUTING).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-05-06 CVE Reserved
- 2003-05-08 CVE Published
- 2024-08-08 CVE Updated
- 2024-09-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html | Mailing List | |
http://marc.info/?l=bugtraq&m=105595901923063&w=2 | Mailing List | |
http://marc.info/?l=linux-kernel&m=104956079213417 | X_refsource_misc | |
http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html | X_refsource_misc | |
http://www.secunia.com/advisories/8786 | Third Party Advisory | |
http://www.securityfocus.com/bid/7601 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15382 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2003/dsa-311 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2003-145.html | 2017-10-11 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=105301461726555&w=2 | 2017-10-11 | |
http://www.debian.org/security/2003/dsa-312 | 2017-10-11 | |
http://www.debian.org/security/2003/dsa-332 | 2017-10-11 | |
http://www.debian.org/security/2003/dsa-336 | 2017-10-11 | |
http://www.debian.org/security/2004/dsa-442 | 2017-10-11 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 | 2017-10-11 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2003-147.html | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2003-172.html | 2017-10-11 | |
https://access.redhat.com/security/cve/CVE-2003-0244 | 2003-06-25 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617005 | 2003-06-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.4.0 Search vendor "Linux" for product "Linux Kernel" and version "2.4.0" | - |
Affected
|