Local users can exploit iproute to cause denial of service; update package recommended.
Reporter | Title | Published | Views | Family All 17 |
---|---|---|---|---|
![]() | iproute local Denial of Service vulnerability | 9 Apr 200400:00 | – | gentoo |
![]() | CVE-2003-0856 | 15 Dec 200305:00 | – | cve |
![]() | Gentoo Security Advisory GLSA 200404-10 () | 24 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200404-10 () | 24 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 492-1 (iproute) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-492) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2003-0856 | 15 Dec 200300:00 | – | ubuntucve |
![]() | CVE-2003-0856 | 15 Dec 200305:00 | – | nvd |
![]() | Fedora Core 1 : iproute-2.4.7-13.2 (2004-115) | 23 Jul 200400:00 | – | nessus |
![]() | RHEL 2.1 / 3 : iproute (RHSA-2003:317) | 6 Jul 200400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | powerpc | iproute | 20010824-8woody1 | iproute_20010824-8woody1_powerpc.deb |
Debian | 3 | arm | iproute | 20010824-8woody1 | iproute_20010824-8woody1_arm.deb |
Debian | 3 | i386 | iproute | 20010824-8woody1 | iproute_20010824-8woody1_i386.deb |
Debian | 3 | all | iproute | 20010824-8woody1 | iproute_20010824-8woody1_all.deb |
Debian | 3 | mips | iproute | 20010824-8woody1 | iproute_20010824-8woody1_mips.deb |
Debian | 3 | m68k | iproute | 20010824-8woody1 | iproute_20010824-8woody1_m68k.deb |
Debian | 3 | sparc | iproute | 20010824-8woody1 | iproute_20010824-8woody1_sparc.deb |
Debian | 3 | hppa | iproute | 20010824-8woody1 | iproute_20010824-8woody1_hppa.deb |
Debian | 3 | s390 | iproute | 20010824-8woody1 | iproute_20010824-8woody1_s390.deb |
Debian | 3 | alpha | iproute | 20010824-8woody1 | iproute_20010824-8woody1_alpha.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo