ID CVE-2003-0364
Summary The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2007-04-25T19:52:26.134-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
family unix
id oval:org.mitre.oval:def:295
status accepted
submitted 2003-09-26T12:00:00.000-04:00
title Linux Kernel TCP/IP Fragment Reassembly Denial of Service
version 38
redhat via4
advisories
  • rhsa
    id RHSA-2003:187
  • rhsa
    id RHSA-2003:195
  • rhsa
    id RHSA-2003:198
refmap via4
debian
  • DSA-311
  • DSA-312
  • DSA-332
  • DSA-336
  • DSA-442
turbo TLSA-2003-41
Last major update 11-10-2017 - 01:29
Published 16-06-2003 - 04:00
Last modified 11-10-2017 - 01:29
Back to Top