ID CVE-2003-0244
Summary The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2007-04-25T19:52:24.590-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
family unix
id oval:org.mitre.oval:def:261
status accepted
submitted 2003-09-25T12:00:00.000-04:00
title Linux Route Cache / Netfilter Denial of Service
version 38
redhat via4
advisories
  • rhsa
    id RHSA-2003:145
  • rhsa
    id RHSA-2003:147
  • rhsa
    id RHSA-2003:172
refmap via4
bid 7601
bugtraq 20030618 [slackware-security] 2.4.21 kernels available (SSA:2003-168-01)
debian
  • DSA-311
  • DSA-312
  • DSA-332
  • DSA-336
  • DSA-442
engarde ESA-20030515-017
mandrake
  • MDKSA-2003:066
  • MDKSA-2003:074
misc
secunia 8786
vulnwatch 20030517 Algorithmic Complexity Attacks and the Linux Networking Code
xf data-algorithmic-complexity-dos(15382)
Last major update 11-10-2017 - 01:29
Published 27-05-2003 - 04:00
Last modified 11-10-2017 - 01:29
Back to Top