CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5274 | CVE-2002-0884 | Candidate | Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote attackers to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr and (2) error. | Proposed (20020830) | ACCEPT(5) Alderson, Armstrong, Baker, Cole, Frech | MODIFY(1) Jones | NOOP(3) Christey, Cox, Foat | Jones> Suggest description: "...allows remote attackers to execute | arbitrary code via the functions (1) syserr and | (2) error." | Christey> Correction: this is a RARP (Reverse Address Resolution | Protocol) server. | | A colleague of mine with access to Solaris source has noted | that the affected syslog calls can not be fed user-supplied | data, at least for Solaris; if so, then this is not a vulnerability. | Baker> I think you leave the description as it specifies how the attacker is able to execute arbitrary commands. | View |
5275 | CVE-2002-0885 | Candidate | Multiple buffer overflows in in.rarpd (ARP server) on Solaris, and possibly other operating systems including Caldera UnixWare and Open UNIX, allow remote attackers to execute arbitrary code, possibly via the functions (1) syserr and (2) error. | Proposed (20020830) | ACCEPT(3) Baker, Cole, Frech | MODIFY(1) Alderson | NOOP(5) Armstrong, Christey, Cox, Foat, Jones | Jones> Need clarification/verification. | Alderson> Personally, since this one is not only vague, but extremely vague | and not even confirmed, I believe it should be lumped with the previous one | that has been confirmed and is much less vague. | Christey> Correction: this is a RARP (Reverse Address Resolution | Protocol) server. | A colleague of mine with access to Solaris source has noted | that the affected syslog calls can not be fed user-supplied | data, at least for Solaris; if so, then this is not a vulnerability. | View |
5278 | CVE-2002-0888 | Candidate | 3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote attackers to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router. | Proposed (20020830) | ACCEPT(2) Alderson, Frech | NOOP(5) Armstrong, Cole, Cox, Foat, Jones | View | |
5282 | CVE-2002-0893 | Candidate | Directory traversal vulnerability in NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to read arbitrary files via a URL-encoded request to com.newatlanta.servletexec.JSP10Servlet containing "..%5c" (modified dot-dot) sequences. | Proposed (20020830) | ACCEPT(1) Frech | MODIFY(1) Jones | NOOP(5) Alderson, Armstrong, Cole, Cox, Foat | Jones> Suggest: "... via a URL-encoded request to | /servlet/com.newatlanta.servletexec.JSP10Servlet/ containing sequences like | "..%5c" (modified dot-dot)." | View |
5283 | CVE-2002-0894 | Candidate | NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to cause a denial of service (crash) via (1) a request for a long .jsp file, or (2) a long URL sent directly to com.newatlanta.servletexec.JSP10Servlet. | Proposed (20020830) | ACCEPT(1) Frech | MODIFY(1) Jones | NOOP(5) Alderson, Armstrong, Cole, Cox, Foat | Jones> Suggest: "... via (1) a request for a long-named .jsp file, or (2) | a long string sent directly to | /servlet/com.newatlanta.servletexec.JSP10Servlet/ or | /servlet/com.newatlanta.servletexec.JSPServlet/." | View |
Page 20887 of 20943, showing 5 records out of 104715 total, starting on record 104431, ending on 104435