{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T10:24:09.425","vulnerabilities":[{"cve":{"id":"CVE-2003-0467","sourceIdentifier":"cve@mitre.org","published":"2003-08-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a denial of service (crash) in systems using NAT, possibly due to an integer signedness error."},{"lang":"es","value":"Vulnerabilidad desconocida en ip_nat_sack_adjust de Netfilter en los kernels de Linux 2.4.20 y algunos 2.5.x,cuando CONFIG_IP_NF_NAT_FTP o CONFIG_IP_NF_NAT_IRC están activados, o los módulos ip_nat_ftp o ip_nat_irc están cargados, permite a atacantes remotos causar una denegación de servicio (caída) en sistemas usando NAT, posiblemente debido a un error de signos de enteros"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","matchCriteriaId":"476687F9-722B-490C-BD0B-B5F2CD7891DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","matchCriteriaId":"A399D94B-D08D-4454-A07A-6634C9AE612F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*","matchCriteriaId":"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*","matchCriteriaId":"DCD8E4AE-FEF7-4CE2-B338-4F766921593F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*","matchCriteriaId":"13A8B50A-73F6-4FCF-A81F-FB624FBA7143"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=105985703724758&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=105985703724758&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}