First published: Mon Aug 12 2002(Updated: )
The accept_filter mechanism in FreeBSD 4 through 4.5 does not properly remove entries from the incomplete listen queue when adding a syncache, which allows remote attackers to cause a denial of service (network service availability) via a large number of connection attempts, which fills the queue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.5-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0794 has a moderate severity level due to its potential to cause denial of service.
To fix CVE-2002-0794, upgrade FreeBSD to a version later than 4.5 that addresses this vulnerability.
CVE-2002-0794 affects FreeBSD versions 4.0 through 4.5, specifically 4.5-release.
CVE-2002-0794 can be exploited by remote attackers through a high volume of connection attempts, leading to an overload of the listen queue.
Exploitation of CVE-2002-0794 can result in a denial of service, causing network service unavailability.