CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4573 | CVE-2002-0180 | Candidate | Buffer overflow in Webalizer 2.01-06, when configured to use reverse DNS lookups, allows remote attackers to execute arbitrary code by connecting to the monitored web server from an IP address that resolves to a long hostname. | Modified (20050510) | ACCEPT(4) Baker, Cole, Cox, Green | MODIFY(2) Frech, Jones | NOOP(4) Armstrong, Christey, Foat, Wall | Cox> According to the author of Webalizer the issue is not remotely | exploitable, but this hasn"t been confirmed by us yet. Needs | investigation. | | http://www.mrunix.net/webalizer/news.html | CHANGE> [Cox changed vote from MODIFY to REVIEWING] | Cox> Author says this cannot be exploited to execute arbitrary code | Jones> Description of acknowledged vulnerability indicates remotely | exploitable (buffer overflow is in code which is processing | input from a remote system (a DNS server)); root or non-root | depends on privileges of resolver process (which is likely | same as privileges of Webalizer process). So, remotely | exploitable to run arbitrary code with privileges of the | Webalizer process. | Cox> I actually meant that the author doesn"t think this is an exploitable | overflow at all, see | | ---------- Forwarded message ---------- | Date: Wed, 17 Apr 2002 02:19:37 -0400 (EDT) | From: Bradford L. Barrett <brad@mrunix.net> | To: Franck Coppola <franck@hosting42.com> | Cc: Spybreak <spybreak@host.sk>, bugtraq@securityfocus.com, | vulnwatch@vulnwatch.org | Subject: Re: Remote buffer overflow in Webalizer | | | > Here is a patch to fix the vulnerability (tested against webalizer-2.01-06). | | Bad fix.. while it will prevent the buffer from overflowing (which I still | fail to see how can be used to execute a "root" exploit, even with a LOT | of imagination), but will cause the buffer to be filled with a non-null | terminated string which will do all sorts of nasty things to your output, | not to mention wreak havoc on the stats since you are cutting off the | domain portion, not the hostname part, and adding random garbage at the | end. | | Anyway, Version 2.01-10 has been released, which fixes this and a few | other buglets that have been discovered in the last month or so. Get it | at the usual place (web: www.mrunix.net/webalizer/ or www.webalizer.org | or ftp: ftp.mrunix.net/pub/webalizer/), and should be on the mirror sites | soon. | | -- | Bradford L. Barrett brad@mrunix.net | A free electron in a sea of neutrons DoD#1750 KD4NAW | | | Christey> XF:webalizer-reverse-dns-bo(8837) | URL:http://www.iss.net/security_center/static/8837.php | BID:4504 | URL:http://www.securityfocus.com/bid/4504 | VULNWATCH:20020415 [VulnWatch] Remote buffer overflow in Webalizer | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0017.html | ENGARDE:ESA-20020423-009 | CONECTIVA:CLA-2002:476 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000476 | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Cox> after reviewing I agree with the description given | Frech> XF: webalizer-reverse-dns-bo(8837) | Christey> REDHAT:RHSA-2002:254 | Christey> CALDERA:CSSA-2002-036.0 | (note: CVE-2002-1234 was accidentally assigned to that Caldera | advisory, but this is the correct CAN to use) | View |
6867 | CVE-2003-0038 | Candidate | Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters. | Modified (20071129) | ACCEPT(4) Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> DEBIAN:DSA-436 | URL:http://www.debian.org/security/2004/dsa-436 | View |
6855 | CVE-2003-0026 | Candidate | Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname. | Modified (20071129) | ACCEPT(4) Baker, Cole, Cox, Wall | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:dhcpd-minires-multiple-bo(11073) | Christey> MANDRAKE:MDKSA-2003:007 | URL:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:007 | SUSE:SUSE-SA:2003:0006 | URL:http://www.suse.de/de/security/2003_006_dhcp.html | | Since the SuSE advisory name is "malformed" according to | SuSE"s own convention, make sure that "SuSE-SA:2003:006" is in | the keywords for this CAN. | View |
2272 | CVE-2000-0696 | Candidate | The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts, which allows remote attackers to add user accounts to the interface by directly calling the admin CGI script. | Modified (20080918) | ACCEPT(4) Baker, Cole, Dik, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:solaris-answerbook2-admin-interface | Christey> XF:solaris-answerbook2-admin-interface | http://xforce.iss.net/static/5069.php | Christey> BUGTRAQ:20000807 Vulnerabilities in Sun Solaris AnswerBook2 dwhttpd server | http://www.securityfocus.com/archive/1/74382 | Christey> Fix typo: "CGi" | CHANGE> [Dik changed vote from REVIEWING to ACCEPT] | View |
2273 | CVE-2000-0697 | Candidate | The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metacharacters. | Modified (20080918) | ACCEPT(4) Baker, Cole, Dik, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:solaris-answerbook2-remote-execution | Christey> XF:solaris-answerbook2-remote-execution | http://xforce.iss.net/static/5058.php | CHANGE> [Dik changed vote from REVIEWING to ACCEPT] | Dik> COMMENTS | verified bug existance. | Christey> There needs to be a separate item for the .. problem reported | in this same post. | View |
Page 1016 of 20943, showing 5 records out of 104715 total, starting on record 5076, ending on 5080