Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2003-0550
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.007
EPSS Ranking
71.0%
CVSS Severity
CVSS v2 Score
5.0
References
http://www.debian.org/security/2004/dsa-358
http://www.debian.org/security/2004/dsa-423
http://www.redhat.com/support/errata/RHSA-2003-238.html
http://www.redhat.com/support/errata/RHSA-2003-239.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A380
http://www.debian.org/security/2004/dsa-358
http://www.debian.org/security/2004/dsa-423
http://www.redhat.com/support/errata/RHSA-2003-238.html
http://www.redhat.com/support/errata/RHSA-2003-239.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A380
Products affected by CVE-2003-0550
Redhat
»
Linux
»
Version:
2.4.2
cpe:2.3:o:redhat:linux:2.4.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved