Insecure Design of STP Protocol in Linux 2.4.x Allows Unauthorized Modification of Bridge Topology

Insecure Design of STP Protocol in Linux 2.4.x Allows Unauthorized Modification of Bridge Topology

CVE-2003-0550 · MEDIUM Severity

AV:N/AC:L/AU:N/C:N/I:P/A:N

The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.