CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4478  CVE-2002-0084  Candidate  Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.  Modified (20061101)  ACCEPT(3) Cole, Green, Wall | NOOP(3) Christey, Foat, Ziese  Christey> CERT:CA-2002-11 | CERT-VN:VU#635811 | AUSCERT:AA-2002.01 | URL:http://www.auscert.org.au/Information/Advisories/advisory/AA-2002.01.txt | Christey> BUGTRAQ:20020429 eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mount file buffer overflow vulnerability | URL:http://online.securityfocus.com/archive/1/270135 | Christey> ADDREF CERT-VN:VU#161931 | ADDREF BUGTRAQ:20020429 eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mount file buffer overflow vulnerability | ADDREF CONFIRM:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309 | | Note: this is a different vulnerability than CVE-2002-0033. | However, if there are different patches for the 2 issues, then | they may need to be merged per CD:SF-LOC. | | Add that the affected function is fscache_setup() | Christey> VULNWATCH:20020429 [VulnWatch] eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mou nt file buffer overflow vulnerability | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0048.html | BID:4631 | URL:http://www.securityfocus.com/bid/4631  View
4482  CVE-2002-0088  Candidate  Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path.  Modified (20061101)  ACCEPT(3) Cole, Green, Wall | NOOP(3) Christey, Foat, Ziese  Christey> BUGTRAQ:20020429 eSecurityOnline Security Advisory 4123 - Sun Solaris admintool media installation path buffer overflow vulnerability | URL:http://online.securityfocus.com/archive/1/270137 | BID:4632 | URL:http://www.securityfocus.com/bid/4632 | VULNWATCH:20020429 [VulnWatch] eSecurityOnline Security Advisory 4123 - Sun Solaris admintool me dia installation path buffer overflow vulnerability | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0043.html | Christey> CONFIRM:http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert%2F44541&zone_32=category%3Asecurity%20admintool | | (thanks to Matt Wojcik for this info)  View
4483  CVE-2002-0089  Candidate  Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file.  Modified (20061101)  ACCEPT(3) Cole, Green, Ziese | NOOP(3) Christey, Foat, Wall  Christey> VULNWATCH:20020429 [VulnWatch] eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0035.html | BUGTRAQ:20020429 eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities | URL:http://online.securityfocus.com/archive/1/270122 | BID:4624 | URL:http://www.securityfocus.com/bid/4624 | Christey> CONFIRM:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F27353  View
5252  CVE-2002-0862  Candidate  The (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.  Modified (20061101)  ACCEPT(3) Cole, Green, Wall | NOOP(2) Christey, Cox  Christey> Note: CVE-2002-0828 is an earlier discovery of this candidate. | That candidate will be REJECTED in favor of this one, | which comes from a more authoritative source and is | more accurate.  View
5253  CVE-2002-0863  Candidate  Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."  Modified (20061101)  ACCEPT(3) Cole, Green, Wall | NOOP(2) Christey, Cox  Christey> ADDREF CERT-VN:VU#865833 | URL:http://www.kb.cert.org/vuls/id/865833  View

Page 20462 of 20943, showing 5 records out of 104715 total, starting on record 102306, ending on 102310

Actions