Vulnerability Name: | CVE-2003-0244 (CCN-12002) | ||||||||||||||||||||||||||||||||
Assigned: | 2003-04-05 | ||||||||||||||||||||||||||||||||
Published: | 2003-04-05 | ||||||||||||||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||||||||||||||
Summary: | The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
References: | Source: VULNWATCH Type: UNKNOWN 20030517 Algorithmic Complexity Attacks and the Linux Networking Code Source: MITRE Type: CNA CVE-2003-0244 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:702 kernel Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:796 kernel Source: ENGARDE Type: UNKNOWN ESA-20030515-017 Source: BUGTRAQ Type: UNKNOWN 20030618 [slackware-security] 2.4.21 kernels available (SSA:2003-168-01) Source: MISC Type: UNKNOWN http://marc.info/?l=linux-kernel&m=104956079213417 Source: CCN Type: Linux-Kernel Mailing List, 2003-04-05 16:37:43 Route cache performance under stress Source: CCN Type: RHSA-2003-145 Updated kernel fixes security vulnerabilities and updates drivers Source: CCN Type: RHSA-2003-147 kernel security update Source: CCN Type: RHSA-2003-172 Updated 2.4 kernel fixes security vulnerabilities and various bugs Source: CCN Type: RHSA-2003-190 Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities Source: CCN Type: SA8786 Linux Kernel Route Cache Flooding Denial of Service Source: CCN Type: Rice University, Department of Computer Science Denial of Service via Algorithmic Complexity Attacks Source: DEBIAN Type: Patch, Vendor Advisory DSA-311 Source: DEBIAN Type: UNKNOWN DSA-312 Source: DEBIAN Type: UNKNOWN DSA-332 Source: DEBIAN Type: UNKNOWN DSA-336 Source: DEBIAN Type: UNKNOWN DSA-442 Source: DEBIAN Type: DSA-311 linux-kernel-2.4.18 -- several vulnerabilities Source: DEBIAN Type: DSA-312 kernel-patch-2.4.18-powerpc -- several vulnerabilities Source: DEBIAN Type: DSA-332 linux-kernel-2.4.17 -- several vulnerabilities Source: DEBIAN Type: DSA-336 linux-kernel-2.2.20 -- several vulnerabilities Source: DEBIAN Type: DSA-442 linux-kernel-2.4.17-s390 -- several vulnerabilities Source: MISC Type: UNKNOWN http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html Source: CCN Type: Gentoo Linux Security Announcement 200308-01 gentoo-sources Source: CCN Type: EnGarde Secure Linux Security Advisory ESA-20030515-017 several bug and security-related fixes Source: MANDRAKE Type: UNKNOWN MDKSA-2003:066 Source: MANDRAKE Type: UNKNOWN MDKSA-2003:074 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2003:145 Source: REDHAT Type: UNKNOWN RHSA-2003:147 Source: REDHAT Type: UNKNOWN RHSA-2003:172 Source: SECUNIA Type: UNKNOWN 8786 Source: BID Type: UNKNOWN 7601 Source: CCN Type: BID-7601 Linux Kernel Route Cache Entry Remote Denial Of Service Vulnerability Source: CCN Type: BID-7756 Multiple Vendor Algorithmic Complexity Denial of Service Vulnerability Source: CCN Type: slackware-security Mailing List, Tue June 17 19:41:55 PDT 2003 [slackware-security] 2.4.21 kernels available (SSA:2003-168-01) Source: CCN Type: TLSA-2003-41 Multiple vulnerabilities in kernel Source: XF Type: UNKNOWN route-cache-source-dos(12002) Source: XF Type: UNKNOWN data-algorithmic-complexity-dos(15382) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:261 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |