{ "id": "CVE-2003-0244", "sourceIdentifier": "cve@mitre.org", "published": "2003-05-27T04:00:00.000", "lastModified": "2017-10-11T01:29:08.073", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions." }, { "lang": "es", "value": "La implementaci\u00f3n de la cach\u00e9 de ruta en Linux 2.4 y el m\u00f3dulo Netfilter IP conntrack permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (agotamiento de CPU) mediante paquetes con una direcci\u00f3n fuente alterada (lo que causa un elevado n\u00famero de colisiones de tabla hash relacionadas con la cadena PREROUTING)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=105301461726555&w=2", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=105595901923063&w=2", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=linux-kernel&m=104956079213417", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-311", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.debian.org/security/2003/dsa-312", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-332", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-336", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2004/dsa-442", "source": "cve@mitre.org" }, { "url": "http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html", "source": "cve@mitre.org" }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:066", "source": "cve@mitre.org" }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:074", "source": "cve@mitre.org" }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-147.html", "source": "cve@mitre.org" }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-172.html", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/7601", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15382", "source": "cve@mitre.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A261", "source": "cve@mitre.org" } ] }