Executive Summary

Informations
Name CVE-2002-0830 First vendor Publication 2002-08-12
Vendor Cve Last vendor Modification 2017-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Network File System (NFS) in FreeBSD 4.6.1 RELEASE-p7 and earlier, NetBSD 1.5.3 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service (hang) via an RPC message with a zero length payload, which causes NFS to reference a previous payload and enter an infinite loop.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0830

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 80

Open Source Vulnerability Database (OSVDB)

Id Description
5072 Multiple BSD NFS Zero Length Payload RPC Message DoS

The Network File System (NFS) on FreeBSD, NetBSD and OpenBSD contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious user sends a RPC message containing a zero-length payload to a NFS server. This causes the NFS server to reference a previous payload and enter into an infinite loop, resulting in a loss of availability for the platform.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/5402
CONFIRM http://www.info.apple.com/usen/security/security_updates.html
FREEBSD http://marc.info/?l=bugtraq&m=102865517214722&w=2
NETBSD ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-013.txt.asc
OSVDB http://www.osvdb.org/5072
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/9772

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Date Informations
2024-02-02 01:02:01
  • Multiple Updates
2024-02-01 12:01:22
  • Multiple Updates
2023-09-05 12:01:56
  • Multiple Updates
2023-09-05 01:01:13
  • Multiple Updates
2023-09-02 12:01:57
  • Multiple Updates
2023-09-02 01:01:13
  • Multiple Updates
2023-08-12 12:02:19
  • Multiple Updates
2023-08-12 01:01:13
  • Multiple Updates
2023-08-11 12:02:01
  • Multiple Updates
2023-08-11 01:01:14
  • Multiple Updates
2023-08-06 12:01:52
  • Multiple Updates
2023-08-06 01:01:14
  • Multiple Updates
2023-08-04 12:01:56
  • Multiple Updates
2023-08-04 01:01:14
  • Multiple Updates
2023-07-14 12:01:54
  • Multiple Updates
2023-07-14 01:01:14
  • Multiple Updates
2023-03-29 01:01:53
  • Multiple Updates
2023-03-28 12:01:19
  • Multiple Updates
2022-12-15 01:01:45
  • Multiple Updates
2022-10-11 12:01:42
  • Multiple Updates
2022-10-11 01:01:07
  • Multiple Updates
2021-05-05 01:01:19
  • Multiple Updates
2021-05-04 12:01:43
  • Multiple Updates
2021-04-22 01:01:51
  • Multiple Updates
2020-05-23 01:35:51
  • Multiple Updates
2020-05-23 00:15:02
  • Multiple Updates
2019-03-21 01:01:01
  • Multiple Updates
2019-03-19 12:01:31
  • Multiple Updates
2017-10-10 09:23:24
  • Multiple Updates
2017-03-30 12:00:45
  • Multiple Updates
2016-10-18 12:01:02
  • Multiple Updates
2016-06-28 14:59:30
  • Multiple Updates
2016-04-26 12:12:58
  • Multiple Updates
2013-05-11 12:10:46
  • Multiple Updates