First published: Mon Mar 27 2000(Updated: )
IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =2.1 | |
Debian Debian Linux | =2.2 | |
Debian Debian Linux | =2.2 | |
Linux Kernel | =2.2.10 | |
Linux Kernel | =2.2.12 | |
Linux Kernel | =2.2.14 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0289 has a medium severity rating due to its potential to allow unauthorized access to internal networks.
To fix CVE-2000-0289, it is recommended to upgrade to a patched version of the Linux kernel or disable IP masquerading.
CVE-2000-0289 affects Linux kernel versions 2.2.x, including various distributions like Debian and Red Hat.
The impact of CVE-2000-0289 allows remote attackers to route UDP packets through the internal interface, potentially leading to further exploits.
Yes, CVE-2000-0289 can be exploited remotely by attackers who can manipulate the source IP address and port of UDP packets.