Lucene search

K
cve[email protected]CVE-2002-2254
HistoryOct 14, 2007 - 8:00 p.m.

CVE-2002-2254

2007-10-1420:00:00
CWE-264
web.nvd.nist.gov
26
cve-2002-2254
linux kernel
netfilter
iptables
ip packet queuing
network traffic
privilege escalation
security vulnerability
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.11pre3
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.18pre9
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.5.0
OR
linuxlinux_kernelMatch2.5.1
OR
linuxlinux_kernelMatch2.5.2
OR
linuxlinux_kernelMatch2.5.3
OR
linuxlinux_kernelMatch2.5.10
OR
linuxlinux_kernelMatch2.5.11
OR
linuxlinux_kernelMatch2.5.12
OR
linuxlinux_kernelMatch2.5.13
OR
linuxlinux_kernelMatch2.5.14
OR
linuxlinux_kernelMatch2.5.15
OR
linuxlinux_kernelMatch2.5.16
OR
linuxlinux_kernelMatch2.5.17
OR
linuxlinux_kernelMatch2.5.18
OR
linuxlinux_kernelMatch2.5.19
OR
linuxlinux_kernelMatch2.5.20
OR
linuxlinux_kernelMatch2.5.21
OR
linuxlinux_kernelMatch2.5.22
OR
linuxlinux_kernelMatch2.5.23
OR
linuxlinux_kernelMatch2.5.24
OR
linuxlinux_kernelMatch2.5.25
OR
linuxlinux_kernelMatch2.5.26
OR
linuxlinux_kernelMatch2.5.27
OR
linuxlinux_kernelMatch2.5.28
OR
linuxlinux_kernelMatch2.5.29
OR
linuxlinux_kernelMatch2.5.30
OR
linuxlinux_kernelMatch2.5.31

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

Related for CVE-2002-2254