CVE List

Id CVE No. Status Description Phase Votes Comments Actions
257  CVE-1999-0258  Candidate  Bonk variation of teardrop IP fragmentation denial of service.  Proposed (19990726)  MODIFY(2) Frech, Wall | REVIEWING(1) Christey  Wall> Reference Q179129 | Frech> XF:teardrop-mod | Christey> Not sure how many separate "instances" of Teardrop there are. | See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258 | Christey> See the SCO advisory at: | http://www.securityfocus.com/templates/advisory.html?id=1411 | which may further clarify the issue. | Christey> BUGTRAQ:19980108 bonk.c | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=88429524325956&w=2 | NTBUGTRAQ:19980108 bonk.c | URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88433857200304&w=2 | NTBUGTRAQ:19980109 Re: Bonk.c | URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88441302913269&w=2 | NTBUGTRAQ:19980304 Update on wide-spread NewTear Denial of Service attacks | URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88901842000424&w=2 | BUGTRAQ:19980304 Update on wide-spread NewTear Denial of Service attacks | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=88903296104349&w=2 | CIAC:I-031a | http://ciac.llnl.gov/ciac/bulletins/i-031a.shtml | | CERT summary CS-98.02 implies that bonk, boink, and newtear | all exploit the same vulnerability.  View
286  CVE-1999-0287  Candidate  Vulnerability in the Wguest CGI program.  Proposed (19990714)  MODIFY(2) Frech, Shostack | NOOP(4) Blake, Levy, Northcutt, Wall | REJECT(2) Baker, Christey  Shostack> allows file reading | Frech> XF:http-cgi-webcom-guestbook | Christey> CVE-1999-0287 is probably a duplicate of CVE-1999-0467. In | NTBUGTRAQ:19990409 Webcom"s CGI Guestbook for Win32 web servers | Mnemonix says that he had previously reported on a similar | problem. Let"s refer to the NTBugtraq posting as | CVE-1999-0467. We will refer to the "previous report" as | CVE-1999-0287, which could be found at: | http://oliver.efri.hr/~crv/security/bugs/NT/httpd41.html | | 0287 describes an exploit via the "template" hidden variable. | The exploit describes manually editing the HTML form to | change the filename to read from the template variable. | | The exploit as described in 0467 encodes the template variable | directly into the URL. However, hidden variables are also | encoded into the URL, which would have looked the same to | the web server regardless of the exploit. Therefore 0287 | and 0467 are the same. | Christey> BID:2024  View
2069  CVE-2000-0491  Candidate  Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote attackers to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request.  Proposed (20000712)  MODIFY(2) Frech, Levy | NOOP(2) LeBlanc, Wall | REVIEWING(2) Christey, Ozancin  Levy> The BID 1233 vulns is different from the other ones. BID 1233 uses | a FORWARD_QUERY request to overflow an in_addr structure via a memmove | in daemon/xdmcp.c, gdm_xdmcp_handle_forward_query(). In BID 1370 | a buffer is overflowed by a sprintf in xdmcp.c, send_failed(). | Frech> XF:gnome-gdm-bo(4530) | Christey> MANDRAKE:MDKSA-2001:070 | URL:http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-070.php3 | Christey> BUGTRAQ:20000527 gdm exploit | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=96017189021021&w=2 | | Consider REDHAT:RHSA-2000:027 | Christey> RHSA-2000:027 confirmed via Mark Cox  View
1639  CVE-2000-0061  Candidate  Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading.  Proposed (20000125)  MODIFY(2) Frech, LeBlanc | NOOP(1) Baker | REJECT(1) Christey  Frech> XF:ie-cross-frame-docs(3901) | LeBlanc> - I"d like to see a KB or bulletin referenced | Christey> This is a duplicate of CVE-2000-0156. The FAQ at | http://www.microsoft.com/technet/security/bulletin/fq00-009.asp. | says "the vulnerability requires Active Scripting" and | "it is possible, under very specific conditions, to violate IE"s | cross-domain security model." Also says "the redirect is made, via | the <IMG SRC> HTML tag" | | Need to copy these references over to CVE-2000-0156.  View
5239  CVE-2002-0849  Candidate  Linux-iSCSI iSCSI implementation installs the iscsi.conf file with world-readable permissions on some operating systems, including Red Hat Linux Limbo Beta #1, which could allow local users to gain privileges by reading the cleartext CHAP password.  Modified (20050610)  MODIFY(2) Foat, Frech | NOOP(4) Armstrong, Christey, Cole, Wall | REJECT(1) Cox  Cox> CD:EX-BETA | Foat> The candidate notes that this vulnerability pertains to "some | operating systems" and specifically mentions only Red Hat Linux Limbo Beta #1. | We found the file to be world readable on Red Hat Linux 7.2. | Frech> XF:linux-iscsi-conf-insecure(9792) | Christey> MISC:http://www.seifried.org/security/advisories/kssa-004.html  View

Page 19785 of 20943, showing 5 records out of 104715 total, starting on record 98921, ending on 98925

Actions