2.1
CVSSv2

CVE-2002-2254

Published: 31/12/2002 Updated: 29/07/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.4.0

linux linux kernel 2.4.1

linux linux kernel 2.4.15

linux linux kernel 2.4.16

linux linux kernel 2.4.18

linux linux kernel 2.4.19

linux linux kernel 2.5.13

linux linux kernel 2.5.14

linux linux kernel 2.5.21

linux linux kernel 2.5.22

linux linux kernel 2.5.29

linux linux kernel 2.5.3

linux linux kernel 2.4.13

linux linux kernel 2.4.14

linux linux kernel 2.5.11

linux linux kernel 2.5.12

linux linux kernel 2.5.2

linux linux kernel 2.5.20

linux linux kernel 2.5.27

linux linux kernel 2.5.28

linux linux kernel 2.4.11

linux linux kernel 2.4.12

linux linux kernel 2.5.1

linux linux kernel 2.5.10

linux linux kernel 2.5.18

linux linux kernel 2.5.19

linux linux kernel 2.5.25

linux linux kernel 2.5.26

linux linux kernel 2.4.10

linux linux kernel 2.4.17

linux linux kernel 2.5.0

linux linux kernel 2.5.15

linux linux kernel 2.5.16

linux linux kernel 2.5.17

linux linux kernel 2.5.23

linux linux kernel 2.5.24

linux linux kernel 2.5.30

linux linux kernel 2.5.31