CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5669 | CVE-2002-1285 | Candidate | runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox | CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> LPRng does not contain anything called runlpr, and in fact if you | look at the packages SuSE say that they ship as part of the erratum they | don"t even provide updated LPRng packages. However they do ship lprfilter | packages and looking inside them I find that they are what contain this | runlpr program: | | http://at.rpmfind.net/opsys/linux/RPM/suse.com/i386/update/8.0/ap1/lpdfilter-0.42-155.i386.html | | This states that lpdfilter is a collection of scripts written by SuSE, and | the changelog even highlights this is where the security fix was made. | Therefore I believe that the CVE reference and all the descriptions of | this vulnerability, which are based on a bad advisory description from | SuSE, are also wrong, it should be: | | "runlpr from the SuSE lpdfilter package allows the local lp user to gain | root privileges via certain command line arguments." | View |
5690 | CVE-2002-1306 | Candidate | Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the "lisa" daemon, and (2) remote attackers to execute arbitrary code via a certain "lan://" URL. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox | Cox> Suggest adding "KDE" into description | Addref: RHSA-2002:221 | View |
5549 | CVE-2002-1165 | Candidate | Sendmail Consortium"s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified. | Modified (20080207) | ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox | Cox> Addref: RHSA-2002:259 | View |
5558 | CVE-2002-1174 | Candidate | Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox | Cox> Addref: REDHAT:RHSA-2002:216 | View |
5559 | CVE-2002-1175 | Candidate | The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox | Cox> Addref: REDHAT:RHSA-2002:216 | View |
Page 20034 of 20943, showing 5 records out of 104715 total, starting on record 100166, ending on 100170