Description
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
Products
- Debian Linux 2.2 for 68k
- Debian Linux 2.2 for Alpha
- Debian Linux 2.2 for ARM
- Debian Linux 2.2 for IA-32
- Debian Linux 2.2 for PowerPC
- Debian Linux 2.2 for SPARC
- MandrakeSoft Mandrake Linux 8.0
- Mandrakesoft Mandrake Linux 8.0 on PPC
- MandrakeSoft Mandrake Linux 8.1
- Mandrakesoft Mandrake Linux 8.1 on IA64
- MandrakeSoft Mandrake Linux 8.2
- Microsoft Windows 98 Gold
- Microsoft windows 98_gold
- Microsoft Windows 98SE
- Microsoft windows 98_se
- Microsoft Windows XP Home Edition
- Microsoft Windows XP Gold Professional
- Microsoft Windows XP (gold) Home Edition
- Microsoft Windows XP Professional Gold
- Microsoft Windows XP Service Pack 1 Home Edition
- Microsoft Windows XP Service Pack 2 Home Edition
- Microsoft Windows XP Service Pack 3 Home Edition
- Red Hat Enterprise Linux 3.0 Advanced Servers
- Red Hat Enterprise Linux 3.0 Enterprise Server Edition
- Red Hat Enterprise Linux 3.0 Workstation
- Red Hat Enterprise Linux 4.0 Advanced Server
- Red Hat Enterprise Linux 4.0 Enterprise Server
- Red Hat Enterprise Linux 4.0 Workstation
- Red Hat Desktop 3.0
- Red Hat Desktop 4.0
- Red Hat Linux 6.2 on Alpha
- Red Hat Linux 6.2 on i386
- Red Hat Linux 6.2 on SPARC
- Red Hat Linux 7.0 on Alpha
- Red Hat Linux 7.0 on i386
- Red Hat Linux 7.0 on SPARC
- Red Hat Linux 7.1 on Alpha
- Red Hat Linux 7.1 on i386
- Red Hat Linux 7.1 on IA64
- Red Hat Linux 7.2 on I386
- Red Hat Linux 7.2 on IA64
- Red Hat Linux 7.3 on I386
- Red Hat Linux Advanced Workstation 2.1 on IA64
- Red Hat Linux Advanced Workstation 2.1 on Itanium Processor
- SGI IRIX 6.5.10
- SGI IRIX 6.5.11
- SGI IRIX 6.5.12
- SGI IRIX 6.5.13
- SGI IRIX 6.5.14f
- SGI IRIX 6.5.14m
- SGI IRIX 6.5.15f
- SGI IRIX 6.5.15m
- SGI IRIX 6.5.16f
- SGI IRIX 6.5.16m
- SGI IRIX 6.5.17f
- SGI IRIX 6.5.17m
- SGI IRIX 6.5.18f
- SGI IRIX 6.5.18m
- SGI IRIX 6.5.1
- SGI IRIX 6.5.2
- SGI IRIX 6.5.3
- SGI IRIX 6.5.4
- SGI IRIX 6.5.5
- SGI IRIX 6.5.6
- SGI IRIX 6.5.7
- SGI IRIX 6.5.8
- SGI IRIX 6.5.9
- SGI IRIX 6.5
- SUSE Linux 6.4 on i386
- SUSE Linux 6.4 on PPC
- SuSE SuSE Linux 6.4 alpha
- SUSE Linux 7.0 on i386
- SUSE Linux 7.0 on PPC
- SUSE Linux 7.0 on SPARC
- SuSE SuSE Linux 7.0 alpha
- SUSE Linux 7.1
- SUSE Linux 7.1 on SPARC
- SUSE Linux 7.1 on x86
- SuSE SuSE Linux 7.1 alpha
- SUSE Linux 7.2 on i386
- SUSE Linux 7.3 on i386
- SUSE Linux 7.3 on PPC
- SUSE Linux 7.3 on SPARC
- SUSE Linux 8.0 on i386
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-2185, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-2185 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References