First published: Fri Jul 25 2003(Updated: )
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0551 has been classified as a denial of service vulnerability.
To fix CVE-2003-0551, update your system to a version of Linux that has patched the STP protocol implementation.
CVE-2003-0551 affects Linux kernel version 2.4.x, particularly Red Hat Linux 2.4.2.
Yes, CVE-2003-0551 can be exploited remotely by sending specially crafted STP packets.
The potential impacts of CVE-2003-0551 include system crashes and service disruptions.