5
CVSSv2

CVE-2003-0364

Published: 16/06/2003 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.

Affected Products

Vendor Product Versions
RedhatLinux7.1, 7.2, 7.3, 8.0, 9.0

Vendor Advisories

A number of vulnerabilities have been discovered in the Linux kernel CAN-2002-1380: Linux kernel 22x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface CVE-2002-0429: The iBCS routines in arch/i386/kernel/t ...
A number of vulnerabilities have been discovered in the Linux kernel CVE-2002-0429: The iBCS routines in arch/i386/kernel/trapsc for Linux kernels 2418 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device ...
A number of vulnerabilities have been discovered in the Linux kernel CVE-2002-0429: The iBCS routines in arch/i386/kernel/trapsc for Linux kernels 2418 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device ...
Several security related problems have been fixed in the Linux kernel 2417 used for the S/390 architecture, mostly by backporting fixes from 2418 and incorporating recent security fixes The corrections are listed below with the identification from the Common Vulnerabilities and Exposures (CVE) project: CVE-2002-0429: The iBCS routines in a ...