Lucene search

K
nvd[email protected]NVD:CVE-2002-2254
HistoryDec 31, 2002 - 5:00 a.m.

CVE-2002-2254

2002-12-3105:00:00
CWE-264
web.nvd.nist.gov

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.11pre3
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.18pre9
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.5.0
OR
linuxlinux_kernelMatch2.5.1
OR
linuxlinux_kernelMatch2.5.2
OR
linuxlinux_kernelMatch2.5.3
OR
linuxlinux_kernelMatch2.5.10
OR
linuxlinux_kernelMatch2.5.11
OR
linuxlinux_kernelMatch2.5.12
OR
linuxlinux_kernelMatch2.5.13
OR
linuxlinux_kernelMatch2.5.14
OR
linuxlinux_kernelMatch2.5.15
OR
linuxlinux_kernelMatch2.5.16
OR
linuxlinux_kernelMatch2.5.17
OR
linuxlinux_kernelMatch2.5.18
OR
linuxlinux_kernelMatch2.5.19
OR
linuxlinux_kernelMatch2.5.20
OR
linuxlinux_kernelMatch2.5.21
OR
linuxlinux_kernelMatch2.5.22
OR
linuxlinux_kernelMatch2.5.23
OR
linuxlinux_kernelMatch2.5.24
OR
linuxlinux_kernelMatch2.5.25
OR
linuxlinux_kernelMatch2.5.26
OR
linuxlinux_kernelMatch2.5.27
OR
linuxlinux_kernelMatch2.5.28
OR
linuxlinux_kernelMatch2.5.29
OR
linuxlinux_kernelMatch2.5.30
OR
linuxlinux_kernelMatch2.5.31

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

Related for NVD:CVE-2002-2254