Vulnerability Name: | CVE-2003-0696 (CCN-13328) | ||||||||
Assigned: | 2003-10-01 | ||||||||
Published: | 2003-10-01 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | The getipnodebyname() API in AIX 5.1 and 5.2 does not properly close sockets, which allows attackers to cause a denial of service (resource exhaustion). | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2003-0696 Source: CCN Type: IBM APAR IY46024 NEED TO CLOSE THE SOCKET OPENED EARLIER Source: CCN Type: IBM APAR IY46273 NEED TO CLOSE THE SOCKET OPENED EARLIER Source: CCN Type: OSVDB ID: 2624 IBM AIX getipnodebyname() API Local DoS Source: BID Type: Patch, Vendor Advisory 8738 Source: CCN Type: BID-8738 IBM AIX GetIPNodeByName API Socket Management Vulnerability Source: XF Type: UNKNOWN aix-sendmail-getipnodebyname-dos(13328) Source: XF Type: UNKNOWN aix-sendmail-getipnodebyname-dos(13328) Source: CCN Type: IBM SECURITY ADVISORY getipnodebyname() API does not close sockets. Source: CONFIRM Type: UNKNOWN https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=7&heading=AIX51&topic=SECURITY&month=200310&label=getipnodebyname%28%29+API+does+not+close+sockets.&date=20031001&bulletin=datafile150755&embed=true | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |