CVE-2003-0001

Current Description

Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.

Referenced by CVEs:CVE-2013-4690, CVE-2018-0014

Basic Data

PublishedJanuary 17, 2003
Last ModifiedApril 30, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFreebsdFreebsd4.2*******
    2.3OSFreebsdFreebsd4.3*******
    2.3OSFreebsdFreebsd4.4*******
    2.3OSFreebsdFreebsd4.5*******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.7*******
    2.3OSLinuxLinux Kernel2.4.1*******
    2.3OSLinuxLinux Kernel2.4.2*******
    2.3OSLinuxLinux Kernel2.4.3*******
    2.3OSLinuxLinux Kernel2.4.4*******
    2.3OSLinuxLinux Kernel2.4.5*******
    2.3OSLinuxLinux Kernel2.4.6*******
    2.3OSLinuxLinux Kernel2.4.7*******
    2.3OSLinuxLinux Kernel2.4.8*******
    2.3OSLinuxLinux Kernel2.4.9*******
    2.3OSLinuxLinux Kernel2.4.10*******
    2.3OSLinuxLinux Kernel2.4.11*******
    2.3OSLinuxLinux Kernel2.4.12*******
    2.3OSLinuxLinux Kernel2.4.13*******
    2.3OSLinuxLinux Kernel2.4.14*******
    2.3OSLinuxLinux Kernel2.4.15*******
    2.3OSLinuxLinux Kernel2.4.16*******
    2.3OSLinuxLinux Kernel2.4.17*******
    2.3OSLinuxLinux Kernel2.4.18*******
    2.3OSLinuxLinux Kernel2.4.19*******
    2.3OSLinuxLinux Kernel2.4.20*******
    2.3OSMicrosoftWindows 2000********
    2.3OSMicrosoftWindows 2000*sp1******
    2.3OSMicrosoftWindows 2000*sp2******
    2.3OSMicrosoftWindows 2000 Terminal Services********
    2.3OSMicrosoftWindows 2000 Terminal Services*sp1******
    2.3OSMicrosoftWindows 2000 Terminal Services*sp2******
    2.3OSNetbsdNetbsd1.5*******
    2.3OSNetbsdNetbsd1.5.1*******
    2.3OSNetbsdNetbsd1.5.2*******
    2.3OSNetbsdNetbsd1.5.3*******
    2.3OSNetbsdNetbsd1.6*******

Vulnerable Software List

VendorProductVersions
Microsoft Windows 2000 *
Microsoft Windows 2000 Terminal Services *
Freebsd Freebsd 4.2, 4.3, 4.4, 4.5, 4.6, 4.7
Netbsd Netbsd 1.5, 1.5.1, 1.5.2, 1.5.3, 1.6
Linux Linux Kernel 2.4.1, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.2, 2.4.20, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9

References

NameSourceURLTags
20030110 More information regarding Etherleakhttp://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.htmlVULNWATCH
20030110 More information regarding Etherleakhttp://marc.info/?l=bugtraq&m=104222046632243&w=2BUGTRAQ
7996http://secunia.com/advisories/7996SECUNIA
A010603-1http://www.atstake.com/research/advisories/2003/a010603-1.txtATSTAKEVendor Advisory
http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdfhttp://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdfMISC
VU#412115http://www.kb.cert.org/vuls/id/412115CERT-VNThird Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlCONFIRM
9962http://www.osvdb.org/9962OSVDB
RHSA-2003:025http://www.redhat.com/support/errata/RHSA-2003-025.htmlREDHAT
RHSA-2003:088http://www.redhat.com/support/errata/RHSA-2003-088.htmlREDHAT
20030106 Etherleak: Ethernet frame padding information leakage (A010603-1)http://www.securityfocus.com/archive/1/305335/30/26420/threadedBUGTRAQ
20030117 Re: More information regarding Etherleakhttp://www.securityfocus.com/archive/1/307564/30/26270/threadedBUGTRAQ
1031583http://www.securitytracker.com/id/1031583SECTRACK
1040185http://www.securitytracker.com/id/1040185SECTRACK
oval:org.mitre.oval:def:2665https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665OVAL