mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
132 lines
4.7 KiB
JSON
132 lines
4.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2003-0001",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20030117 Re: More information regarding Etherleak",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/307564/30/26270/threaded"
|
|
},
|
|
{
|
|
"name": "1031583",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1031583"
|
|
},
|
|
{
|
|
"name": "9962",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/9962"
|
|
},
|
|
{
|
|
"name": "RHSA-2003:088",
|
|
"refsource": "REDHAT",
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-088.html"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
|
},
|
|
{
|
|
"name": "20030110 More information regarding Etherleak",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=104222046632243&w=2"
|
|
},
|
|
{
|
|
"name": "VU#412115",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/412115"
|
|
},
|
|
{
|
|
"name": "20030106 Etherleak: Ethernet frame padding information leakage (A010603-1)",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/305335/30/26420/threaded"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:2665",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665"
|
|
},
|
|
{
|
|
"name": "20030110 More information regarding Etherleak",
|
|
"refsource": "VULNWATCH",
|
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2003:025",
|
|
"refsource": "REDHAT",
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-025.html"
|
|
},
|
|
{
|
|
"name": "7996",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/7996"
|
|
},
|
|
{
|
|
"name": "A010603-1",
|
|
"refsource": "ATSTAKE",
|
|
"url": "http://www.atstake.com/research/advisories/2003/a010603-1.txt"
|
|
},
|
|
{
|
|
"name": "1040185",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1040185"
|
|
},
|
|
{
|
|
"name": "http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf",
|
|
"refsource": "MISC",
|
|
"url": "http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |