CVE-2003-0244

The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html
http://marc.info/?l=bugtraq&m=105301461726555&w=2
http://marc.info/?l=bugtraq&m=105595901923063&w=2
http://marc.info/?l=linux-kernel&m=104956079213417
http://www.debian.org/security/2003/dsa-311 Patch Vendor Advisory
http://www.debian.org/security/2003/dsa-312
http://www.debian.org/security/2003/dsa-332
http://www.debian.org/security/2003/dsa-336
http://www.debian.org/security/2004/dsa-442
http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
http://www.redhat.com/support/errata/RHSA-2003-145.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2003-147.html
http://www.redhat.com/support/errata/RHSA-2003-172.html
http://www.secunia.com/advisories/8786/
http://www.securityfocus.com/bid/7601
https://exchange.xforce.ibmcloud.com/vulnerabilities/15382
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html
http://marc.info/?l=bugtraq&m=105301461726555&w=2
http://marc.info/?l=bugtraq&m=105595901923063&w=2
http://marc.info/?l=linux-kernel&m=104956079213417
http://www.debian.org/security/2003/dsa-311 Patch Vendor Advisory
http://www.debian.org/security/2003/dsa-312
http://www.debian.org/security/2003/dsa-332
http://www.debian.org/security/2003/dsa-336
http://www.debian.org/security/2004/dsa-442
http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
http://www.redhat.com/support/errata/RHSA-2003-145.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2003-147.html
http://www.redhat.com/support/errata/RHSA-2003-172.html
http://www.secunia.com/advisories/8786/
http://www.securityfocus.com/bid/7601
https://exchange.xforce.ibmcloud.com/vulnerabilities/15382
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html - () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html -
References () http://marc.info/?l=bugtraq&m=105301461726555&w=2 - () http://marc.info/?l=bugtraq&m=105301461726555&w=2 -
References () http://marc.info/?l=bugtraq&m=105595901923063&w=2 - () http://marc.info/?l=bugtraq&m=105595901923063&w=2 -
References () http://marc.info/?l=linux-kernel&m=104956079213417 - () http://marc.info/?l=linux-kernel&m=104956079213417 -
References () http://www.debian.org/security/2003/dsa-311 - Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-311 - Patch, Vendor Advisory
References () http://www.debian.org/security/2003/dsa-312 - () http://www.debian.org/security/2003/dsa-312 -
References () http://www.debian.org/security/2003/dsa-332 - () http://www.debian.org/security/2003/dsa-332 -
References () http://www.debian.org/security/2003/dsa-336 - () http://www.debian.org/security/2003/dsa-336 -
References () http://www.debian.org/security/2004/dsa-442 - () http://www.debian.org/security/2004/dsa-442 -
References () http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html - () http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 -
References () http://www.redhat.com/support/errata/RHSA-2003-145.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2003-145.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2003-147.html - () http://www.redhat.com/support/errata/RHSA-2003-147.html -
References () http://www.redhat.com/support/errata/RHSA-2003-172.html - () http://www.redhat.com/support/errata/RHSA-2003-172.html -
References () http://www.secunia.com/advisories/8786/ - () http://www.secunia.com/advisories/8786/ -
References () http://www.securityfocus.com/bid/7601 - () http://www.securityfocus.com/bid/7601 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15382 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15382 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261 -

Information

Published : 2003-05-27 04:00

Updated : 2024-11-20 23:44


NVD link : CVE-2003-0244

Mitre link : CVE-2003-0244

CVE.ORG link : CVE-2003-0244


JSON object : View

Products Affected

linux

  • linux_kernel