CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
509 | CVE-1999-0512 | Candidate | A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | Modified (20020427-01) | ACCEPT(3) Baker, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:smtp-sendmail-relay(210) | XF:ntmail-relay(2257) | XF:exchange-relay(3107) (also assigned to CVE-1999-0682) | XF:smtp-relay-uucp(3470) | XF:sco-sendmail-spam(4342) | XF:sco-openserver-mmdf-spam(4343) | XF:lotus-domino-smtp-mail-relay(6591) | XF:win2k-smtp-mail-relay(6803) | XF:cobalt-poprelayd-mail-relay(6806) | | Candidate implicitly may refer to relaying settings enabled by default, or | the bypass/circumvention of relaying. Both interpretations were used in | assigning this candidate. | Christey> The intention of this candidate is to cover configurations in | which the admin has explicitly enabled relaying. Other cases | in which the application *intends* to prvent relaying, but | there is some specific input that bypasses/tricks it, count | as vulnerabilities (or exposures?) and as such would be | assigned different numbers. | | http://www.sendmail.org/~ca/email/spam.html seems like a good | general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt | Christey> I changed the description to make it more clear that the issue | is that of explicit configuration, as opposed to being the | result of a vulnerability. | View |
3664 | CVE-2001-0858 | Candidate | Buffer overflow in pppattach and other linked PPP utilities in Caldera Open Unix 8.0 and UnixWare 7.1.0 and 7.1.1 allows local users to gain privileges. | Modified (20020817-01) | ACCEPT(5) Armstrong, Baker, Bishop, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:unixware-openunix-ppp-bo(7570) | View |
4724 | CVE-2002-0332 | Candidate | Buffer overflows in xtell (xtelld) 1.91.1 and earlier, and 2.x before 2.7, allows remote attackers to execute arbitrary code via (1) a long DNS hostname that is determined using reverse DNS lookups, (2) a long AUTH string, or (3) certain data in the xtell request. | Modified (20020817-01) | ACCEPT(3) Baker, Cole, Frech | NOOP(4) Christey, Cox, Foat, Wall | Christey> DELREF XF:xtell-tty-directory-traversal(8313) | ADDREF XF:xtell-bo(8312) | View |
4745 | CVE-2002-0353 | Candidate | The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields. | Modified (20020817-01) | ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Christey> DEBIAN:DSA-130 | Christey> REDHAT:RHSA-2002:088 | URL:http://www.redhat.com/support/errata/RHSA-2002-088.html | BID:4604 | URL:http://www.securityfocus.com/bid/4604 | Christey> XF:ethereal-asn1-dos(8952) | URL:http://www.iss.net/security_center/static/8952.php | Frech> XF:ethereal-asn1-dos(8952) | Christey> CALDERA:CSSA-2002-037.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html | View |
4770 | CVE-2002-0378 | Candidate | The default configuration of LPRng print spooler in Red Hat Linux 7.0 through 7.3, Mandrake 8.1 and 8.2, and other operating systems, accepts print jobs from arbitrary remote hosts. | Modified (20020817-01) | ACCEPT(5) Baker, Cole, Cox, Foat, Wall | NOOP(1) Christey | Christey> Also affects HP. | XF:lprng-remote-jobs-dos(9322) | URL:http://www.iss.net/security_center/static/9322.php | BID:4980 | URL:http://www.securityfocus.com/bid/4980 | HP:HPSBTL0206-048 | URL:http://online.securityfocus.com/advisories/4205 | View |
Page 20396 of 20943, showing 5 records out of 104715 total, starting on record 101976, ending on 101980