Vulnerability Name: | CVE-2003-0573 (CCN-12636) |
Assigned: | 2003-07-16 |
Published: | 2003-07-16 |
Updated: | 2008-09-05 |
Summary: | The DNS callbacks in nsd in SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, do not perform sufficient sanity checking, with unknown impact.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Configuration |
References: | Source: CCN Type: SGI Security Advisory 20030407-01-P Multiple Vulnerabilities in Name Service Daemon (nsd)
Source: SGI Type: Patch, Vendor Advisory 20030701-01-P
Source: MITRE Type: CNA CVE-2003-0573
Source: CCN Type: SA9291 SGI IRIX Name Service Daemon Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1007224 SGI IRIX Name Service Daemon (nsd) Bugs Let Remote Users Crash the System
Source: CCN Type: OSVDB ID: 8588 IRIX nsd DNS callbacks Unspecified Issue
Source: CCN Type: BID-8218 SGI IRIX Multiple Name Service Daemon Vulnerabilities
Source: XF Type: UNKNOWN irix-nsd-dns-callbacks(12636)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.19f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.19m:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |