5
CVSSv2

CVE-2003-0364

Published: 16/06/2003 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat linux 7.2

redhat linux 7.3

redhat linux 7.1

redhat linux 8.0

redhat linux 9.0

Vendor Advisories

A number of vulnerabilities have been discovered in the Linux kernel CAN-2002-1380: Linux kernel 22x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface CVE-2002-0429: The iBCS routines in arch/i386/kernel/t ...
A number of vulnerabilities have been discovered in the Linux kernel CVE-2002-0429: The iBCS routines in arch/i386/kernel/trapsc for Linux kernels 2418 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device ...
Several security related problems have been fixed in the Linux kernel 2417 used for the S/390 architecture, mostly by backporting fixes from 2418 and incorporating recent security fixes The corrections are listed below with the identification from the Common Vulnerabilities and Exposures (CVE) project: CVE-2002-0429: The iBCS routines in a ...
A number of vulnerabilities have been discovered in the Linux kernel CVE-2002-0429: The iBCS routines in arch/i386/kernel/trapsc for Linux kernels 2418 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device ...