Vulnerability Name: | CVE-2001-0388 (CCN-6228) |
Assigned: | 2001-03-12 |
Published: | 2001-03-12 |
Updated: | 2017-10-10 |
Summary: | time server daemon timed allows remote attackers to cause a denial of service via malformed packets.
|
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Denial of Service |
References: | Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.33 OpenServer 5.0.5 OpenServer 5.0.6 : timed does not enforce nulls
Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-01:28 timed allows remote denial of service
Source: FREEBSD Type: Patch, Vendor Advisory FreeBSD-SA-01:28
Source: CCN Type: SGI Security Advisory 20020401-02-P Mail, mailx, sort, timed and gzip vulnerabilities
Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2001-SCO.39 Open UNIX, UnixWare 7: timed does not enforce nulls
Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:007 nkitb/nkitserv
Source: MITRE Type: CNA CVE-2001-0388
Source: CCN Type: CIAC Information Bulletin M-067 SGI Mail, mailx, sort, timed, and gzip Vulnerabilities
Source: MANDRAKE Type: Patch, Vendor Advisory MDKSA-2001:034
Source: SUSE Type: UNKNOWN SuSE-SA:2001:07
Source: CCN Type: OSVDB ID: 1776 Multiple Vendor timed Malformed Packet DoS
Source: CCN Type: BID-2491 timed Small Packet Denial of Service Vulnerability
Source: CCN Type: MandrakeSoft Security Advisory MDKSA-2001:034 timed
Source: XF Type: UNKNOWN timed-remote-dos(6228)
Source: XF Type: UNKNOWN timed-remote-dos(6228)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:* (Version <= 4.1)OR cpe:/o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:freebsd:freebsd:3.0:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:3.1:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:3.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.2:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:3.3:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:3.4:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:3.5:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
freebsd freebsd *
mandrakesoft mandrake linux 6.0
mandrakesoft mandrake linux 6.1
mandrakesoft mandrake linux 7.0
mandrakesoft mandrake linux 7.1
mandrakesoft mandrake linux 7.2
suse suse linux 6.1
suse suse linux 6.2
suse suse linux 6.3
suse suse linux 6.4
suse suse linux 7.0
suse suse linux 7.1
freebsd freebsd 3.0
sgi irix 6.5
sgi irix 6.5.1
sgi irix 6.5.3
sgi irix 6.5.4
freebsd freebsd 3.1
freebsd freebsd 3.2
suse suse linux 6.2
freebsd freebsd 3.3 -
freebsd freebsd 3.4
freebsd freebsd 4.0
suse suse linux 6.3
suse suse linux 6.4
mandrakesoft mandrake linux 7.0
suse suse linux 6.1
mandrakesoft mandrake linux 7.1
freebsd freebsd 3.5
mandrakesoft mandrake linux 6.0
mandrakesoft mandrake linux 6.1
freebsd freebsd 4.1
mandrakesoft mandrake linux 7.2
suse suse linux 7.0
sgi irix 6.5.7
mandrakesoft mandrake linux corporate server 1.0.1
suse suse linux 7.1
sgi irix 6.5.5
sgi irix 6.5.6
sgi irix 6.5.8
sgi irix 6.5.9
sgi irix 6.5.10
sgi irix 6.5.11
sgi irix 6.5.12
sgi irix 6.5.13
sgi irix 6.5.14
sgi irix 6.5.15
sgi irix 6.5.10f
sgi irix 6.5.10m
sgi irix 6.5.11f
sgi irix 6.5.11m
sgi irix 6.5.12f
sgi irix 6.5.12m
sgi irix 6.5.13f
sgi irix 6.5.13m
sgi irix 6.5.14f
sgi irix 6.5.14m
sgi irix 6.5.15f
sgi irix 6.5.2f
sgi irix 6.5.2m
sgi irix 6.5.3f
sgi irix 6.5.3m
sgi irix 6.5.4f
sgi irix 6.5.4m
sgi irix 6.5.5f
sgi irix 6.5.5m
sgi irix 6.5.6f
sgi irix 6.5.6m
sgi irix 6.5.7f
sgi irix 6.5.7m
sgi irix 6.5.8f
sgi irix 6.5.8m
sgi irix 6.5.9f
sgi irix 6.5.9m