CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5276 | CVE-2002-0886 | Candidate | Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. | Modified (20050601) | ACCEPT(5) Alderson, Armstrong, Baker, Cole, Frech | NOOP(2) Cox, Foat | RECAST(1) Jones | Jones> A single large packet DoS to a listening service (which sounds | like a buffer overflow) seems like a different vulnerability than multiple | large packets (which is admittedly resource consumption). Suggest SPLIT | into two items, prolems 1 and 2 in A, and problem 3 in B. | View |
5056 | CVE-2002-0666 | Candidate | IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. | Modified (20050601) | ACCEPT(3) Baker, Cole, Frech | NOOP(3) Christey, Cox, Wall | Christey> DEBIAN:DSA-201 | View |
5103 | CVE-2002-0713 | Candidate | Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. | Modified (20050601) | ACCEPT(4) Armstrong, Baker, Cole, Cox | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Christey> VULNWATCH:20020603 [VulnWatch] [DER #11] - Remotey exploitable fmt string bug in squid | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0087.html | BUGTRAQ:20020604 [DER #11] - Remotey exploitable fmt string bug in squid | URL:http://online.securityfocus.com/archive/1/275347 | | Note that this report is for the "msntauth" module, which | itself is out-of-date, but there is obviously a codebase relationship | with what"s included in the Squid distribution. | Frech> XF:squid-msnt-helper-bo(9482) | Christey> CALDERA:CSSA-2002-046.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt | REDHAT:RHSA-2002:051 | URL:http://rhn.redhat.com/errata/RHSA-2002-051.html | Christey> CALDERA:CSSA-2003-SCO.9 | View |
5105 | CVE-2002-0715 | Candidate | Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user"s proxy login and password. | Modified (20050601) | ACCEPT(4) Armstrong, Baker, Cole, Cox | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Frech> XF:squid-auth-header-forwarding(9478) | Christey> REDHAT:RHSA-2002:051 | URL:http://rhn.redhat.com/errata/RHSA-2002-051.html | Christey> CALDERA:CSSA-2003-SCO.9 | View |
5869 | CVE-2002-1485 | Candidate | The AIM component of Trillian 0.73 and 0.74 allows remote attackers to cause a denial of service (crash) via certain strings such as "P > O < C". | Modified (20050602) | NOOP(5) Armstrong, Baker, Cole, Cox, Wall | View |
Page 20428 of 20943, showing 5 records out of 104715 total, starting on record 102136, ending on 102140