First published: Thu Dec 06 2001(Updated: )
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SCO OpenLinux Server | =3.1 | |
SCO OpenLinux Workstation | =3.1 | |
Linux Kernel | =2.2.0 | |
SCO OpenLinux Server | =2.3.1 | |
SUSE Linux | =7.2 | |
Linux Kernel | =2.0 | |
Linux Kernel | =2.4.0 | |
SUSE Linux | =7.0 | |
Caldera OpenLinux eDesktop | =2.4 | |
SUSE Linux | =7.1 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 | |
SUSE Linux | =7.3 | |
SCO OpenLinux Server | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0851 is considered a high-severity vulnerability as it allows remote attackers to bypass firewall rules.
To fix CVE-2001-0851, disable syncookies or upgrade to a patched version of the Linux kernel.
CVE-2001-0851 affects Linux kernel versions 2.0, 2.2, and 2.4 if syncookies are enabled.
Yes, CVE-2001-0851 can be exploited remotely by attackers who can guess the syncookie.
CVE-2001-0851 impacts systems running SCO OpenLinux, Caldera OpenLinux, and various versions of SUSE Linux that utilize the affected kernel versions.