CVE-2000-0289
Published Mar 27, 2000
Last updated 16 years ago
Overview
- Description
- IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C67BDA1-9451-4026-AC6D-E912C882A757" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EEF4480-D50B-464C-AE39-A12455DBC99F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15928E10-7D41-45B2-87D6-8AA10190A8EB" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6931FB54-A163-4CE3-BBD9-D345AA0977A6" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F65C9D-BD68-4A86-BFDC-E7CE76F13948" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ABD1331-277C-4C31-8186-978243C62255" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89454B9-4F45-4A42-A06D-ED42D893C544" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E64093E-7D53-4238-95C3-48ED5A0FFD97" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7EC2B95-4715-4EC9-A10A-2542501F8A61" } ], "operator": "OR" } ] } ]