CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
8995 | CVE-2004-0567 | Candidate | The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability." | Assigned (20040615) | None (candidate not yet proposed) | View | |
8994 | CVE-2004-0566 | Candidate | Integer overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value. | Assigned (20040615) | None (candidate not yet proposed) | View | |
8993 | CVE-2004-0565 | Candidate | Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. | Assigned (20040615) | None (candidate not yet proposed) | View | |
8992 | CVE-2004-0564 | Candidate | Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer"s warnings. | Assigned (20040614) | NOOP(1) Christey | Christey> In addition to the public statement made to Bugtraq, David | F. Skoll, the developer of pppoe, says: | >CVE-2004-0564 is a | >bogus "vulnerability". rp-pppoe is NOT meant to be installed | >setuid-root. One might as well file a "vulnerability" on "cat" | >because if "cat" is setuid-root, then an "attacker" can read any file | >on the system. | > | >This vulnerability is more properly a Debian vulnerability because | >Debian ... insecurely installs rp-pppoe suid-root. | > | >Please add my comments to the "Comments" field of the CVE; I don"t think | >it should be blessed with an official listing. | View |
8991 | CVE-2004-0563 | Candidate | The tspc.conf configuration file in freenet6 before 0.9.6 and before 1.0 on Debian Linux has world readable permissions, which could allow local users to gain sensitive information, such as a username and password. | Assigned (20040614) | None (candidate not yet proposed) | View |
Page 19145 of 20943, showing 5 records out of 104715 total, starting on record 95721, ending on 95725