CVE-2003-0244 (GCVE-0-2003-0244)
Vulnerability from cvelistv5
Published
2003-05-08 04:00
Modified
2024-08-08 01:43
Severity ?
CWE
  • n/a
Summary
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
References
cve@mitre.org http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html
cve@mitre.org http://marc.info/?l=bugtraq&m=105301461726555&w=2
cve@mitre.org http://marc.info/?l=bugtraq&m=105595901923063&w=2
cve@mitre.org http://marc.info/?l=linux-kernel&m=104956079213417
cve@mitre.org http://www.debian.org/security/2003/dsa-311 Patch, Vendor Advisory
cve@mitre.org http://www.debian.org/security/2003/dsa-312
cve@mitre.org http://www.debian.org/security/2003/dsa-332
cve@mitre.org http://www.debian.org/security/2003/dsa-336
cve@mitre.org http://www.debian.org/security/2004/dsa-442
cve@mitre.org http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
cve@mitre.org http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
cve@mitre.org http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2003-145.html Patch, Vendor Advisory
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2003-147.html
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2003-172.html
cve@mitre.org http://www.secunia.com/advisories/8786/
cve@mitre.org http://www.securityfocus.com/bid/7601
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/15382
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html
af854a3a-2127-422b-91ae-364da2661108 http://marc.info/?l=bugtraq&m=105301461726555&w=2
af854a3a-2127-422b-91ae-364da2661108 http://marc.info/?l=bugtraq&m=105595901923063&w=2
af854a3a-2127-422b-91ae-364da2661108 http://marc.info/?l=linux-kernel&m=104956079213417
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2003/dsa-311 Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2003/dsa-312
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2003/dsa-332
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2003/dsa-336
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2004/dsa-442
af854a3a-2127-422b-91ae-364da2661108 http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2003-145.html Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2003-147.html
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2003-172.html
af854a3a-2127-422b-91ae-364da2661108 http://www.secunia.com/advisories/8786/
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/7601
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/15382
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:43:36.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "7601",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7601"
          },
          {
            "name": "RHSA-2003:147",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-147.html"
          },
          {
            "name": "MDKSA-2003:074",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:074"
          },
          {
            "name": "DSA-336",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-336"
          },
          {
            "name": "oval:org.mitre.oval:def:261",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261"
          },
          {
            "name": "data-algorithmic-complexity-dos(15382)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15382"
          },
          {
            "name": "MDKSA-2003:066",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:066"
          },
          {
            "name": "RHSA-2003:172",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-172.html"
          },
          {
            "name": "ESA-20030515-017",
            "tags": [
              "vendor-advisory",
              "x_refsource_ENGARDE",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2"
          },
          {
            "name": "DSA-311",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-311"
          },
          {
            "name": "DSA-332",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-332"
          },
          {
            "name": "8786",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://www.secunia.com/advisories/8786/"
          },
          {
            "name": "RHSA-2003:145",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html"
          },
          {
            "name": "DSA-312",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-312"
          },
          {
            "name": "20030517 Algorithmic Complexity Attacks and the Linux Networking Code",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html"
          },
          {
            "name": "DSA-442",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-442"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=linux-kernel\u0026m=104956079213417"
          },
          {
            "name": "20030618 [slackware-security]  2.4.21 kernels available (SSA:2003-168-01)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105595901923063\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "7601",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7601"
        },
        {
          "name": "RHSA-2003:147",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-147.html"
        },
        {
          "name": "MDKSA-2003:074",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:074"
        },
        {
          "name": "DSA-336",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-336"
        },
        {
          "name": "oval:org.mitre.oval:def:261",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261"
        },
        {
          "name": "data-algorithmic-complexity-dos(15382)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15382"
        },
        {
          "name": "MDKSA-2003:066",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:066"
        },
        {
          "name": "RHSA-2003:172",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-172.html"
        },
        {
          "name": "ESA-20030515-017",
          "tags": [
            "vendor-advisory",
            "x_refsource_ENGARDE"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2"
        },
        {
          "name": "DSA-311",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-311"
        },
        {
          "name": "DSA-332",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-332"
        },
        {
          "name": "8786",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://www.secunia.com/advisories/8786/"
        },
        {
          "name": "RHSA-2003:145",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html"
        },
        {
          "name": "DSA-312",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-312"
        },
        {
          "name": "20030517 Algorithmic Complexity Attacks and the Linux Networking Code",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html"
        },
        {
          "name": "DSA-442",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-442"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://marc.info/?l=linux-kernel\u0026m=104956079213417"
        },
        {
          "name": "20030618 [slackware-security]  2.4.21 kernels available (SSA:2003-168-01)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105595901923063\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0244",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "7601",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7601"
            },
            {
              "name": "RHSA-2003:147",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-147.html"
            },
            {
              "name": "MDKSA-2003:074",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:074"
            },
            {
              "name": "DSA-336",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-336"
            },
            {
              "name": "oval:org.mitre.oval:def:261",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261"
            },
            {
              "name": "data-algorithmic-complexity-dos(15382)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15382"
            },
            {
              "name": "MDKSA-2003:066",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:066"
            },
            {
              "name": "RHSA-2003:172",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-172.html"
            },
            {
              "name": "ESA-20030515-017",
              "refsource": "ENGARDE",
              "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2"
            },
            {
              "name": "DSA-311",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-311"
            },
            {
              "name": "DSA-332",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-332"
            },
            {
              "name": "8786",
              "refsource": "SECUNIA",
              "url": "http://www.secunia.com/advisories/8786/"
            },
            {
              "name": "RHSA-2003:145",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html"
            },
            {
              "name": "http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html",
              "refsource": "MISC",
              "url": "http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html"
            },
            {
              "name": "DSA-312",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-312"
            },
            {
              "name": "20030517 Algorithmic Complexity Attacks and the Linux Networking Code",
              "refsource": "VULNWATCH",
              "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html"
            },
            {
              "name": "DSA-442",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-442"
            },
            {
              "name": "http://marc.info/?l=linux-kernel\u0026m=104956079213417",
              "refsource": "MISC",
              "url": "http://marc.info/?l=linux-kernel\u0026m=104956079213417"
            },
            {
              "name": "20030618 [slackware-security]  2.4.21 kernels available (SSA:2003-168-01)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=105595901923063\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0244",
    "datePublished": "2003-05-08T04:00:00",
    "dateReserved": "2003-05-06T00:00:00",
    "dateUpdated": "2024-08-08T01:43:36.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2003-0244\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-05-27T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de la cach\u00e9 de ruta en Linux 2.4 y el m\u00f3dulo Netfilter IP conntrack permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (agotamiento de CPU) mediante paquetes con una direcci\u00f3n fuente alterada (lo que causa un elevado n\u00famero de colisiones de tabla hash relacionadas con la cadena PREROUTING).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105595901923063\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=104956079213417\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-311\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-332\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-336\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-442\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:066\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:074\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-145.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-147.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-172.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.secunia.com/advisories/8786/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/7601\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15382\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105595901923063\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=104956079213417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2004/dsa-442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-145.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-147.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-172.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.secunia.com/advisories/8786/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/7601\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…