{"vuid":"VU#102345","idnumber":"102345","name":"IBM AIX vulnerable to DoS","keywords":["IBM","AIX","DoS","denial of service","TCP packets","flags off"],"overview":"A denial-of-service vulnerability in AIX may allow a remote attacker to consume 100% of the CPU.","clean_desc":"AIX is a UNIX operating system distributed by IBM. A vulnerability in AIX 4.3.3 may allow a remote attacker to cause a denial of service. For more information, please see IBM APAR IY31641.","impact":"A remote attacker may be able to consume 100% of the CPU, resulting in a denial of service.","resolution":"Apply a patch.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Mauro Flores <maflores@antel.com.uy> and Guillermo Freire <gfreire@antel.com.uy>.","author":"This document was written by Ian A Finlay.","public":["http://www-1.ibm.com/servers/aix/","http://www-1.ibm.com/servers/aix/overview/index.html","http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=IY31641","http://www-1.ibm.com/support/docview.wss?rs=0&q=IY31641&uid=isg1IY31641&loc=en_US&cs=utf-8&cc=us&lang=en"],"cveids":["CVE-2002-1201"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-10-10T14:32:37Z","publicdate":"2002-10-09T00:00:00Z","datefirstpublished":"2003-06-12T13:24:48Z","dateupdated":"2003-06-12T13:25:04Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"9","cam_scorecurrentwidelyknown":"11.25","cam_scorecurrentwidelyknownexploited":"20.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.0,"vulnote":null}