The Linux 2.0 kernel IP stack does not properly calculate the size of an ICMP citation, which causes it to include portions of unauthorized memory in ICMP error responses.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=105519179005065&w=2 | |
http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/471084 | Patch Third Party Advisory US Government Resource |
http://marc.info/?l=bugtraq&m=105519179005065&w=2 | |
http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/471084 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=105519179005065&w=2 - | |
References | () http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt - Exploit, Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/471084 - Patch, Third Party Advisory, US Government Resource |
Information
Published : 2003-07-24 04:00
Updated : 2024-11-20 23:44
NVD link : CVE-2003-0418
Mitre link : CVE-2003-0418
CVE.ORG link : CVE-2003-0418
JSON object : View
Products Affected
linux
- linux_kernel
CWE