Vulnerability Description
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 3.0 |
| Netbsd | Netbsd | 1.4 |
| Openbsd | Openbsd | 2.5 |
References
- http://www.securityfocus.com/bid/622
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPM
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.990
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3298
- http://www.securityfocus.com/bid/622
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPM
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.990
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3298
FAQ
What is CVE-2000-0489?
CVE-2000-0489 is a vulnerability with a CVSS score of 2.1 (LOW). FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then w...
How severe is CVE-2000-0489?
CVE-2000-0489 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0489?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Netbsd Netbsd, Openbsd Openbsd.