CVE List

Id CVE No. Status Description Phase Votes Comments Actions
641  CVE-1999-0659  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present."  Modified (20080731)  REJECT(3) Baker, Northcutt, Wall  Wall> Don"t consider this a service or a problem. | Baker> concur with wall on this  View
642  CVE-1999-0660  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc."  Modified (20080730)  ACCEPT(4) Baker, Hill, Northcutt, Wall | NOOP(1) Christey  Christey> Add "back door" to description.  View
643  CVE-1999-0661  Candidate  A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.  Modified (20050529)  ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey  Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only.  View
644  CVE-1999-0662  Candidate  A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.  Proposed (19990804)  ACCEPT(4) Baker, Hill, Northcutt, Wall    View
645  CVE-1999-0663  Candidate  A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.  Proposed (19990804)  ACCEPT(3) Baker, Hill, Wall | RECAST(1) Northcutt  Northcutt> This needs to be worded carefully. | 1. Rootkits evade checksum detection. | 2. The modification could be positive (a patch)  View

Page 129 of 20943, showing 5 records out of 104715 total, starting on record 641, ending on 645

Actions