CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
453 | CVE-1999-0454 | Candidate | A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. | Proposed (19990728) | MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(2) Baker, Northcutt | Northcutt> Nmap and queso are the tip of the iceberg and not the most advanced | ways to accomplish this. To pursue making the world signature free | is as much a vulnerability as having signatures, nay more. | Frech> XF:decod-nmap(2053) | XF:decod-queso(2048) | Christey> Add "fingerprinting" to facilitate search. | Some references: | MISC:http://www.insecure.org/nmap/nmap-fingerprinting-article.html | BUGTRAQ:19981228 A few more fingerprinting techniques - time and netmask | http://marc.theaimsgroup.com/?l=bugtraq&m=91489155019895&w=2 | BUGTRAQ:19990222 Preventing remote OS detection | http://marc.theaimsgroup.com/?l=bugtraq&m=91971553006937&w=2 | BUGTRAQ:20000901 ICMP Usage In Scanning v2.0 - Research Paper | http://marc.theaimsgroup.com/?l=bugtraq&m=96791499611849&w=2 | BUGTRAQ:20000912 Using the Unused (Identifying OpenBSD, | http://marc.theaimsgroup.com/?l=bugtraq&m=96879267724690&w=2 | BUGTRAQ:20000912 The DF Bit Playground (Identifying Sun Solaris & OpenBSD OSs) | http://marc.theaimsgroup.com/?l=bugtraq&m=96879481129637&w=2 | BUGTRAQ:20000816 TOSing OSs out of the window / Fingerprinting Windows 2000 with | http://marc.theaimsgroup.com/?l=bugtraq&m=96644121403569&w=2 | BUGTRAQ:20000609 p0f - passive os fingerprinting tool | http://marc.theaimsgroup.com/?l=bugtraq&m=96062535628242&w=2 | Baker> I think we can probably reject this as the corollary is that you can identify OS from a IP/TCP packet sent by a system, looking at various parts of the SYN packet. Unless we believe that all systems should always use identical packet header/identical responses, in which case the protocol should not permit variation. | View |
1048 | CVE-1999-1068 | Candidate | Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request. | Proposed (20010912) | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:oracle-webserver-dos(1812) | View |
1105 | CVE-1999-1125 | Candidate | Oracle Webserver 2.1 and earlier runs setuid root, but the configuration file is owned by the oracle account, which allows any local or remote attacker who obtains access to the oracle account to gain privileges or modify arbitrary files by modifying the configuration file. | Proposed (20010912) | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:oracle-webserver-gain-root(7174) | View |
1145 | CVE-1999-1165 | Candidate | GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files. | Proposed (20010912) | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:gnu-finger-privilege-dropping(7175) | View |
1164 | CVE-1999-1184 | Candidate | Buffer overflow in Elm 2.4 and earlier allows local users to gain privileges via a long TERM environmental variable. | Proposed (20010912) | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:elm-term-bo(7183) | View |
Page 1098 of 20943, showing 5 records out of 104715 total, starting on record 5486, ending on 5490