CVE-2003-0001

Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html
http://marc.info/?l=bugtraq&m=104222046632243&w=2
http://secunia.com/advisories/7996
http://www.atstake.com/research/advisories/2003/a010603-1.txt Vendor Advisory
http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf
http://www.kb.cert.org/vuls/id/412115 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/9962
http://www.redhat.com/support/errata/RHSA-2003-025.html
http://www.redhat.com/support/errata/RHSA-2003-088.html
http://www.securityfocus.com/archive/1/305335/30/26420/threaded
http://www.securityfocus.com/archive/1/307564/30/26270/threaded
http://www.securitytracker.com/id/1031583
http://www.securitytracker.com/id/1040185
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html
http://marc.info/?l=bugtraq&m=104222046632243&w=2
http://secunia.com/advisories/7996
http://www.atstake.com/research/advisories/2003/a010603-1.txt Vendor Advisory
http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf
http://www.kb.cert.org/vuls/id/412115 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/9962
http://www.redhat.com/support/errata/RHSA-2003-025.html
http://www.redhat.com/support/errata/RHSA-2003-088.html
http://www.securityfocus.com/archive/1/305335/30/26420/threaded
http://www.securityfocus.com/archive/1/307564/30/26270/threaded
http://www.securitytracker.com/id/1031583
http://www.securitytracker.com/id/1040185
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:43

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html - () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html -
References () http://marc.info/?l=bugtraq&m=104222046632243&w=2 - () http://marc.info/?l=bugtraq&m=104222046632243&w=2 -
References () http://secunia.com/advisories/7996 - () http://secunia.com/advisories/7996 -
References () http://www.atstake.com/research/advisories/2003/a010603-1.txt - Vendor Advisory () http://www.atstake.com/research/advisories/2003/a010603-1.txt - Vendor Advisory
References () http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf - () http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf -
References () http://www.kb.cert.org/vuls/id/412115 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/412115 - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -
References () http://www.osvdb.org/9962 - () http://www.osvdb.org/9962 -
References () http://www.redhat.com/support/errata/RHSA-2003-025.html - () http://www.redhat.com/support/errata/RHSA-2003-025.html -
References () http://www.redhat.com/support/errata/RHSA-2003-088.html - () http://www.redhat.com/support/errata/RHSA-2003-088.html -
References () http://www.securityfocus.com/archive/1/305335/30/26420/threaded - () http://www.securityfocus.com/archive/1/305335/30/26420/threaded -
References () http://www.securityfocus.com/archive/1/307564/30/26270/threaded - () http://www.securityfocus.com/archive/1/307564/30/26270/threaded -
References () http://www.securitytracker.com/id/1031583 - () http://www.securitytracker.com/id/1031583 -
References () http://www.securitytracker.com/id/1040185 - () http://www.securitytracker.com/id/1040185 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665 -

Information

Published : 2003-01-17 05:00

Updated : 2024-11-20 23:43


NVD link : CVE-2003-0001

Mitre link : CVE-2003-0001

CVE.ORG link : CVE-2003-0001


JSON object : View

Products Affected

netbsd

  • netbsd

microsoft

  • windows_2000_terminal_services
  • windows_2000

linux

  • linux_kernel

freebsd

  • freebsd
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor