Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0704 | First vendor Publication | 2002-07-26 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Network Address Translation (NAT) capability for Netfilter ("iptables") 1.2.6a and earlier leaks translated IP addresses in ICMP error messages. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0704 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-168 | Windows ::DATA Alternate Data Stream |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-212 | Improper Cross-boundary Removal of Sensitive Data |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5130 | Linux IPTables/Netfilter Internal Translated IP Disclosure The Linux kernel's netfilter (iptables) module contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the first packet of an incoming connection 1) needs to be translated via Network Address Translation (NAT), and 2) generates an ICMP error message. This will disclose the untranslated IP address of the relevant machine in the ICMP payload, resulting in a loss of confidentiality. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:54 |
|
2024-11-28 12:05:05 |
|
2024-08-02 12:02:13 |
|
2024-08-02 01:01:20 |
|
2024-02-03 09:28:13 |
|
2024-02-02 01:02:01 |
|
2024-02-01 12:01:21 |
|
2023-09-05 12:01:55 |
|
2023-09-05 01:01:13 |
|
2023-09-02 12:01:56 |
|
2023-09-02 01:01:13 |
|
2023-08-12 12:02:18 |
|
2023-08-12 01:01:13 |
|
2023-08-11 12:02:00 |
|
2023-08-11 01:01:14 |
|
2023-08-06 12:01:51 |
|
2023-08-06 01:01:14 |
|
2023-08-04 12:01:55 |
|
2023-08-04 01:01:13 |
|
2023-07-14 12:01:53 |
|
2023-07-14 01:01:14 |
|
2023-03-29 01:01:52 |
|
2023-03-28 12:01:19 |
|
2022-10-11 12:01:41 |
|
2022-10-11 01:01:06 |
|
2021-05-04 12:01:42 |
|
2021-04-22 01:01:50 |
|
2020-05-23 00:15:00 |
|
2016-10-18 12:01:02 |
|
2013-05-11 12:10:20 |
|