mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
411 lines
16 KiB
JSON
411 lines
16 KiB
JSON
{
|
|
"id": "CVE-2002-2254",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2002-12-31T05:00:00.000",
|
|
"lastModified": "2017-07-29T01:29:01.920",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E244C37-E366-482E-9173-9376D0839839"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11F96BB9-6509-4F1E-9590-E55EE8C6F992"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "718D4631-440E-4783-8966-B2A2D3EF89B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7015F57A-1E3B-42D2-9D12-F695078EFB21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "467721EE-5130-46C5-BBB7-0F4878F3F171"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "171257E7-12C5-4283-88F7-FFE643995563"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0887E02F-9F36-41F0-9F75-060B8414D7BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01278984-9712-48D0-B8B8-F9ACEB0FBA14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E7C423D-23DE-4C7B-A518-66F87E041925"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EA1382E-71B0-4E65-A310-716A244F4FB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "824BBD31-8F3B-4F05-981B-ABF662BBF5F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "388A5C99-1F60-4C20-9AE5-6E73E5A3F819"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53B252BE-92F1-42E2-BF2F-EA6B6AFFEE0C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5888F8D7-15C2-4435-BB3C-8674DFAF0089"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29439AD0-EB8D-4675-A77A-6548FF27ADA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F27AADF6-1605-47FC-8C4D-87827A578A90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B42F4080-A76F-4D17-85E2-CD2D2E4D0450"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6968EF1D-7CC5-430D-866D-206F66486F63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50E6F5C5-BF74-4C10-830A-F232D528D290"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6F04081-D672-488E-A91D-5088DD04AA5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BDB59EF-74EF-462E-BC84-89201F734380"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0755A136-3DE3-4B61-B5EF-F6282AACD38E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1531AD3-2525-4F6E-B77D-FE8863CBD3EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC990132-9DF2-4D23-B9DA-0819809A3CAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FFA51D40-E72C-40A4-B238-70F6806FA1B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E1B7D68-E41E-4A5A-9606-F14F057B39E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7799A9CE-1948-4D71-BADB-A4A7ECAFF5FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70BCB10C-FD72-4F18-84C9-AE0603402426"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54A74CAB-2BD1-48BC-BCEB-983E72B3C56D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF742FF1-5504-41BB-8FAA-D71B83C791B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "901C6D04-3226-4654-9A41-0325B48A2F7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "072A77AD-BB27-4C24-91A0-A12D6E741593"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF900D1D-E351-4407-8269-80E5403432B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44915F9F-88DF-4304-8F66-58A869654BDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CC2D90D-2115-406C-B609-870B241F00B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF681CC1-B3EC-467A-A10D-10840D3D4575"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8660C030-328E-4221-847E-AC4BDA08CE79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0EE83E4E-DBA6-47EB-80FF-9A41A2978DDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B58DE3A3-2BE0-45E3-8EFD-5A4439EAD6DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47AEC277-F9A4-412F-B2EA-C1AEA336A46C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7234AF29-BCDA-4728-A141-C169EE59CEC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7D9064F-466F-4D66-AD5E-8BC2D31CD80D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "374851C5-C61D-4964-8B4A-473B0A008F11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FD55C81-3687-46BF-880E-58D7E005A185"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2953267F-16BF-404F-83F1-73E0908979B2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0025.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/6305",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10756",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |