CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4745 | CVE-2002-0353 | Candidate | The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields. | Modified (20020817-01) | ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Christey> DEBIAN:DSA-130 | Christey> REDHAT:RHSA-2002:088 | URL:http://www.redhat.com/support/errata/RHSA-2002-088.html | BID:4604 | URL:http://www.securityfocus.com/bid/4604 | Christey> XF:ethereal-asn1-dos(8952) | URL:http://www.iss.net/security_center/static/8952.php | Frech> XF:ethereal-asn1-dos(8952) | Christey> CALDERA:CSSA-2002-037.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html | View |
5056 | CVE-2002-0666 | Candidate | IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. | Modified (20050601) | ACCEPT(3) Baker, Cole, Frech | NOOP(3) Christey, Cox, Wall | Christey> DEBIAN:DSA-201 | View |
5770 | CVE-2002-1386 | Candidate | Buffer overflow in traceroute-nanog (aka traceroute-ng) may allow local users to execute arbitrary code via a long hostname argument. | Modified (20050601) | ACCEPT(1) Baker | NOOP(4) Christey, Cole, Cox, Wall | REVIEWING(1) Green | Christey> DEBIAN:DSA-254 | BID:6274 | SUSE:SuSE-SA:2002:043 | View |
6973 | CVE-2003-0144 | Candidate | Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name. | Modified (20071113) | ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox | Christey> DEBIAN:DSA-267 | URL:http://www.debian.org/security/2003/dsa-267 | Christey> DEBIAN:DSA-275 | URL:http://www.debian.org/security/2003/dsa-275 | Christey> DEBIAN:DSA-267 | URL:http://www.debian.org/security/2003/dsa-267 | Christey> SGI:20030406-02-P | Christey> MANDRAKE:MDKSA-2003:059 | URL:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:059 | View |
6979 | CVE-2003-0150 | Candidate | MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf. | Assigned (20030318) | NOOP(1) Christey | Christey> DEBIAN:DSA-303 | URL:http://www.debian.org/security/2003/dsa-303 | View |
Page 20631 of 20943, showing 5 records out of 104715 total, starting on record 103151, ending on 103155