First published: Wed Jun 27 2001(Updated: )
time server daemon timed allows remote attackers to cause a denial of service via malformed packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =6.2 | |
Mandrake Linux | =7.2 | |
Mandrake Linux | =7.0 | |
Mandrake Linux | =7.1 | |
FreeBSD Kernel | <=4.1 | |
Mandrake Linux | =6.0 | |
SUSE Linux | =6.1 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.1 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 | |
Mandrake Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0388 is classified as a denial of service vulnerability.
To fix CVE-2001-0388, update the affected time server daemon to a version that is not susceptible to malformed packets.
CVE-2001-0388 affects FreeBSD versions up to 4.1, Mandrake Linux versions 6.0 to 7.2, and SUSE Linux versions 6.1 to 7.1.
Yes, CVE-2001-0388 can be exploited remotely by sending malformed packets to the time server daemon.
Exploiting CVE-2001-0388 can lead to a denial of service, causing the time server daemon to become unresponsive.