Vulnerability Description
The accept_filter mechanism in FreeBSD 4 through 4.5 does not properly remove entries from the incomplete listen queue when adding a syncache, which allows remote attackers to cause a denial of service (network service availability) via a large number of connection attempts, which fills the queue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 4.5 |
References
- http://archives.neohapsis.com/archives/freebsd/2002-05/0349.htmlPatchVendor Advisory
- http://www.iss.net/security_center/static/9209.phpPatchVendor Advisory
- http://www.osvdb.org/5081
- http://www.securityfocus.com/bid/4879PatchVendor Advisory
- http://archives.neohapsis.com/archives/freebsd/2002-05/0349.htmlPatchVendor Advisory
- http://www.iss.net/security_center/static/9209.phpPatchVendor Advisory
- http://www.osvdb.org/5081
- http://www.securityfocus.com/bid/4879PatchVendor Advisory
FAQ
What is CVE-2002-0794?
CVE-2002-0794 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The accept_filter mechanism in FreeBSD 4 through 4.5 does not properly remove entries from the incomplete listen queue when adding a syncache, which allows remote attackers to cause a denial of servic...
How severe is CVE-2002-0794?
CVE-2002-0794 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0794?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.