CVE-2003-0001
Published Jan 17, 2003
Last updated 6 years ago
Overview
- Description
- Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E" } ], "operator": "OR" } ] } ]