CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3076  CVE-2001-0255  Candidate  FaSTream FTP++ Server 2.0 allows remote attackers to list arbitrary directories by using the "ls" command and including the drive letter name (e.g. C:) in the requested pathname.  Proposed (20010404)  ACCEPT(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(1) Bishop    View
3077  CVE-2001-0256  Candidate  FaSTream FTP++ Server 2.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long username.  Proposed (20010404)  ACCEPT(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(2) Bishop, Christey  Christey> CVE-2000-0831 and CVE-2001-0256 are probable duplicates, since | they involve the same product and version (Fastream FTP++ | 2.0), vuln type (buffer overflow), and attack vector (username).  View
3078  CVE-2001-0257  Candidate  Buffer overflow in Easycom/Safecom Print Server Web service, version 404.590 and earlier, allows remote attackers to execute arbitrary commands via (1) a long URL or (2) a long HTTP header field such as "Host:".  Proposed (20010404)  ACCEPT(2) Cole, Frech | NOOP(3) Bishop, Wall, Ziese    View
3079  CVE-2001-0258  Candidate  The Easycom/Safecom Print Server (firmware 404.590) PrintGuide server allows remote attackers to cause a denial of service via a large number of connections that send null characters.  Proposed (20010404)  ACCEPT(1) Frech | NOOP(4) Bishop, Cole, Wall, Ziese    View
3082  CVE-2001-0261  Candidate  Microsoft Windows 2000 Encrypted File System does not properly destroy backups of files that are encrypted, which allows a local attacker to recover the text of encrypted files.  Proposed (20010404)  ACCEPT(3) Baker, Bishop, Frech | NOOP(3) Christey, Cole, Ziese | REJECT(1) LeBlanc | REVIEWING(1) Wall  Bishop> Sounds like Microsoft just confirmed it! | Christey> The description should make the point that the original files | are in plaintext. | LeBlanc> The preconditions needed to obtain the clear-text backup file | are that the user must be able to read the raw disk. Only administrators | or those with physical access can read the raw disk. An admin could | alter the operating system such that anything a user did would be | available, even EFS information (since the admin can cause processes to | run as any user who is logged on currently). Thus even if this issue | were not present, the same set of preconditions would lead to access to | the same information. In the case of physical access, scrubbing the disk | should be viewed only as raising the bar - information can be recovered | even from overwritten sectors. Additionally, coverage of a file might | not be complete - in the case where a file is truncated, then encrypted, | there could be sectors with file information that the operating system | would have no knowledge of at the time the encryption occurred, and | there is no practical way to wipe these. Considering all the realities | of the situation, the only real-world solution is to create files you"d | like encrypted in a directory marked for encryption. | CHANGE> [Baker changed vote from REVIEWING to ACCEPT]  View

Page 20639 of 20943, showing 5 records out of 104715 total, starting on record 103191, ending on 103195

Actions