Show plain JSON{"id": "CVE-2004-0257", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-11-23T05:00:00.000", "references": [{"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-002.txt.asc", "source": "cve@mitre.org"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016704.html", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=107604603226564&w=2", "source": "cve@mitre.org"}, {"url": "http://www.guninski.com/obsdmtu.html", "source": "cve@mitre.org"}, {"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/netinet6/ip6_output.c", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/3825", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/9577", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15044", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port."}, {"lang": "es", "value": "OpenBSD 3.4 y NetBSD 1.6 y 1.6.1 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (caida) enviand un paquete IPv6 con una MTU peque\u00f1a a un puerto en escucha y a continuaci\u00f3n un conectar TCP a ese puerto."}], "lastModified": "2017-10-10T01:30:19.297", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "249FA642-3732-4654-88CB-3F1D19A5860A"}, {"criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE"}, {"criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51"}, {"criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED"}, {"criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630"}, {"criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}