ID CVE-2003-0551
Summary The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:linux:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:2.4.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2007-04-25T19:52:27.991-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
family unix
id oval:org.mitre.oval:def:384
status accepted
submitted 2003-09-26T12:00:00.000-04:00
title STP Protocol Length Verification Vulnerability
version 38
redhat via4
advisories
  • rhsa
    id RHSA-2003:198
  • rhsa
    id RHSA-2003:238
  • rhsa
    id RHSA-2003:239
refmap via4
debian
  • DSA-358
  • DSA-423
Last major update 11-10-2017 - 01:29
Published 27-08-2003 - 04:00
Last modified 11-10-2017 - 01:29
Back to Top