ID CVE-2002-2185
Summary The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network. IGMP 1 and 2
References
Vulnerable Configurations
  • cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
  • cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
    cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.0:*:sparc:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.0:*:sparc:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
    cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
  • cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
    cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
CVSS
Base: 4.9 (as of 19-10-2018 - 15:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:08:13.642-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
family unix
id oval:org.mitre.oval:def:10736
status accepted
submitted 2010-07-09T03:56:16-04:00
title The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
version 29
redhat via4
advisories
  • rhsa
    id RHSA-2006:0101
  • rhsa
    id RHSA-2006:0140
  • rhsa
    id RHSA-2006:0190
  • rhsa
    id RHSA-2006:0191
rpms
  • kernel-0:2.6.9-22.0.2.EL
  • kernel-debuginfo-0:2.6.9-22.0.2.EL
  • kernel-devel-0:2.6.9-22.0.2.EL
  • kernel-doc-0:2.6.9-22.0.2.EL
  • kernel-hugemem-0:2.6.9-22.0.2.EL
  • kernel-hugemem-devel-0:2.6.9-22.0.2.EL
  • kernel-smp-0:2.6.9-22.0.2.EL
  • kernel-smp-devel-0:2.6.9-22.0.2.EL
  • kernel-0:2.4.21-37.0.1.EL
  • kernel-BOOT-0:2.4.21-37.0.1.EL
  • kernel-debuginfo-0:2.4.21-37.0.1.EL
  • kernel-doc-0:2.4.21-37.0.1.EL
  • kernel-hugemem-0:2.4.21-37.0.1.EL
  • kernel-hugemem-unsupported-0:2.4.21-37.0.1.EL
  • kernel-smp-0:2.4.21-37.0.1.EL
  • kernel-smp-unsupported-0:2.4.21-37.0.1.EL
  • kernel-source-0:2.4.21-37.0.1.EL
  • kernel-unsupported-0:2.4.21-37.0.1.EL
refmap via4
bid 5020
bugtraq 20020614 IGMP denial of service vulnerability
fedora
  • FLSA:157459-1
  • FLSA:157459-2
  • FLSA:157459-3
  • FLSA:157459-4
misc http://www.cs.ucsb.edu/~krishna/igmp_dos/
secunia
  • 18510
  • 18562
  • 18684
sgi 20020901-01-A
xf igmp-spoofed-report-dos(9436)
Last major update 19-10-2018 - 15:29
Published 31-12-2002 - 05:00
Last modified 19-10-2018 - 15:29
Back to Top