CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
70.9%
Cayman gateways vulnerable to a denial of service via oversized ICMP echo (ping) requests. Installing the newest version of the vendor software will resolve this vulnerability.
Cayman gateways running versions 5.5 Build R0, 5.3 Build R2, 5.3 Build R1 are vulnerable to an oversized ICMP echo (ping) request. By sending an oversized ping packet to the gateway, it is possible to crash various services resulting in a denial of service.
Exploiting this vulnerability results in a denial of service.
Upgrade to the latest vendor software release.
104823
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: July 27, 2001 Updated: August 21, 2001
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23104823 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.securityfocus.com/bid/1240>
This vulnerability was discovered by Cassius.
This document was written by Jason Rafail.
CVE IDs: | CVE-2000-0418 |
---|---|
Severity Metric: | 1.41 Date Public: |