Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2002-2185

The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 58.3%
CVSS Severity
CVSS v2 Score 4.9
References
Products affected by CVE-2002-2185
  • Debian » Debian Linux » Version: 2.2
    cpe:2.3:o:debian:debian_linux:2.2
  • Mandrakesoft » Mandrake Linux » Version: 8.0
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.0
  • Mandrakesoft » Mandrake Linux » Version: 8.1
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.1
  • Mandrakesoft » Mandrake Linux » Version: 8.2
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.2
  • Microsoft » Windows 98 » Version: N/A
    cpe:2.3:o:microsoft:windows_98:-
  • Microsoft » Windows 98se » Version: N/A
    cpe:2.3:o:microsoft:windows_98se:-
  • Microsoft » Windows Xp » Version: N/A
    cpe:2.3:o:microsoft:windows_xp:-
  • Redhat » Enterprise Linux » Version: 3.0
    cpe:2.3:o:redhat:enterprise_linux:3.0
  • Redhat » Enterprise Linux » Version: 4.0
    cpe:2.3:o:redhat:enterprise_linux:4.0
  • Redhat » Enterprise Linux Desktop » Version: 3.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
  • Redhat » Enterprise Linux Desktop » Version: 4.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:4.0
  • Redhat » Linux » Version: 6.2
    cpe:2.3:o:redhat:linux:6.2
  • Redhat » Linux » Version: 7.0
    cpe:2.3:o:redhat:linux:7.0
  • Redhat » Linux » Version: 7.1
    cpe:2.3:o:redhat:linux:7.1
  • Redhat » Linux » Version: 7.2
    cpe:2.3:o:redhat:linux:7.2
  • Redhat » Linux » Version: 7.3
    cpe:2.3:o:redhat:linux:7.3
  • Redhat » Linux Advanced Workstation » Version: 2.1
    cpe:2.3:o:redhat:linux_advanced_workstation:2.1
  • Sgi » Irix » Version: 6.5
    cpe:2.3:o:sgi:irix:6.5
  • Sgi » Irix » Version: 6.5.1
    cpe:2.3:o:sgi:irix:6.5.1
  • Sgi » Irix » Version: 6.5.10
    cpe:2.3:o:sgi:irix:6.5.10
  • Sgi » Irix » Version: 6.5.11
    cpe:2.3:o:sgi:irix:6.5.11
  • Sgi » Irix » Version: 6.5.12
    cpe:2.3:o:sgi:irix:6.5.12
  • Sgi » Irix » Version: 6.5.13
    cpe:2.3:o:sgi:irix:6.5.13
  • Sgi » Irix » Version: 6.5.14f
    cpe:2.3:o:sgi:irix:6.5.14f
  • Sgi » Irix » Version: 6.5.14m
    cpe:2.3:o:sgi:irix:6.5.14m
  • Sgi » Irix » Version: 6.5.15f
    cpe:2.3:o:sgi:irix:6.5.15f
  • Sgi » Irix » Version: 6.5.15m
    cpe:2.3:o:sgi:irix:6.5.15m
  • Sgi » Irix » Version: 6.5.16f
    cpe:2.3:o:sgi:irix:6.5.16f
  • Sgi » Irix » Version: 6.5.16m
    cpe:2.3:o:sgi:irix:6.5.16m
  • Sgi » Irix » Version: 6.5.17f
    cpe:2.3:o:sgi:irix:6.5.17f
  • Sgi » Irix » Version: 6.5.17m
    cpe:2.3:o:sgi:irix:6.5.17m
  • Sgi » Irix » Version: 6.5.18f
    cpe:2.3:o:sgi:irix:6.5.18f
  • Sgi » Irix » Version: 6.5.18m
    cpe:2.3:o:sgi:irix:6.5.18m
  • Sgi » Irix » Version: 6.5.2
    cpe:2.3:o:sgi:irix:6.5.2
  • Sgi » Irix » Version: 6.5.3
    cpe:2.3:o:sgi:irix:6.5.3
  • Sgi » Irix » Version: 6.5.4
    cpe:2.3:o:sgi:irix:6.5.4
  • Sgi » Irix » Version: 6.5.5
    cpe:2.3:o:sgi:irix:6.5.5
  • Sgi » Irix » Version: 6.5.6
    cpe:2.3:o:sgi:irix:6.5.6
  • Sgi » Irix » Version: 6.5.7
    cpe:2.3:o:sgi:irix:6.5.7
  • Sgi » Irix » Version: 6.5.8
    cpe:2.3:o:sgi:irix:6.5.8
  • Sgi » Irix » Version: 6.5.9
    cpe:2.3:o:sgi:irix:6.5.9
  • Suse » Suse Linux » Version: 6.4
    cpe:2.3:o:suse:suse_linux:6.4
  • Suse » Suse Linux » Version: 7.0
    cpe:2.3:o:suse:suse_linux:7.0
  • Suse » Suse Linux » Version: 7.1
    cpe:2.3:o:suse:suse_linux:7.1
  • Suse » Suse Linux » Version: 7.2
    cpe:2.3:o:suse:suse_linux:7.2
  • Suse » Suse Linux » Version: 7.3
    cpe:2.3:o:suse:suse_linux:7.3
  • Suse » Suse Linux » Version: 8.0
    cpe:2.3:o:suse:suse_linux:8.0


Contact Us

Shodan ® - All rights reserved