CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1911  CVE-2000-0333  Candidate  tcpdump, Ethereal, and other sniffer packages allow remote attackers to cause a denial of service via malformed DNS packets in which a jump offset refers to itself, which causes tcpdump to enter an infinite loop while decompressing the packet.  Proposed (20000518)  ACCEPT(3) Armstrong, Baker, Levy | MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:sniffer-dns-decode-dos  View
1921  CVE-2000-0343  Candidate  Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.  Proposed (20000518)  ACCEPT(2) Cole, Levy | MODIFY(2) Christey, Frech | NOOP(2) Armstrong, Wall  Frech> XF:sniffit-lmail-bo | Christey> This issue was rediscovered. | ADDREF BUGTRAQ:20020119 remote buffer overflow in sniffit | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=101167452712383&w=2 | ADDREF BUGTRAQ:20000525 `sniffit -L mail" vulnerabilities | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=95928090612990&w=2 | | I reviewed the patch that was claimed in the 20020119 Bugtraq | post, and it could well address the issue. However, since the | patch is also dated around the time of the original Bugtraq | post, *and* it says that it"s addressing an issue that"s | discussed on Bugtraq, that is sufficient to establish | acknowledgement. | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> XF:sniffit-normmail-l-bo(7933) | URL:http://www.iss.net/security_center/static/7933.php  View
1923  CVE-2000-0345  Candidate  The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.  Proposed (20000518)  ACCEPT(1) Prosser | MODIFY(1) Frech | NOOP(5) Armstrong, Baker, Cole, Levy, Wall | REJECT(1) Balinsky  Levy> Arguably this is not a vulnerability. Cisco replying saying this | is standard behaviour that was simply not well documented. They have | no plans to change it and will simply document it better. | Frech> XF:cisco-online-help | Balinsky> As noted in a bugtraq posting by Lisa Napier from Cisco"s Product Security Incident Response Team, this is a poorly documented feature. This is intended behavior, and does not represent a vulnerability in Cisco"s opinion. | http://www.securityfocus.com/frames/?content=/templates/archive.pike?list=1&mid=59434 | Prosser> Although Lisa Napier did say this issue was "functioning as designed", it was not intended to allow unprivileged access. Lisa did indicate that Cisco would be updating instructions on configuration to ensure proper user privileges. So, this should be considered IMHO an "exposure" vice a vulnerability, but security-related none the less. | http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000502222246.28423.qmail@securityfocus.com | | http://www.securityfocus.com/bid/1161  View
1933  CVE-2000-0355  Candidate  pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.  Proposed (20000524)  ACCEPT(3) Baker, Frech, Levy | NOOP(1) Christey  Christey> ADDREF BID:1271 | Christey> ADDREF BID:1271 | URL:http://www.securityfocus.com/bid/1271  View
1935  CVE-2000-0357  Candidate  ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.  Proposed (20000524)  ACCEPT(2) Baker, Levy | MODIFY(1) Frech | NOOP(1) Christey  Christey> ADDREF BID:1275 | Christey> ADDREF BID:1275 | URL:http://www.securityfocus.com/bid/1275 | Frech> XF:linux-orbit-esound-authentication-keys  View

Page 20578 of 20943, showing 5 records out of 104715 total, starting on record 102886, ending on 102890

Actions