CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
101 | CVE-1999-0101 | Entry | Buffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names. | View | |||
102 | CVE-1999-0102 | Entry | Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line. | View | |||
103 | CVE-1999-0103 | Entry | Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm. | View | |||
104 | CVE-1999-0104 | Candidate | A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2. | Modified (20090302) | ACCEPT(2) Frech, Wall | REVIEWING(1) Christey | Wall> Another reference is Microsoft Knowledge Base Q179129. | Christey> Not sure how many separate "instances" of Teardrop there are. | See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258 | Christey> See the SCO advisory at: | http://www.securityfocus.com/templates/advisory.html?id=1411 | which may further clarify the issue. | Christey> MSKB:Q179129 | http://support.microsoft.com/support/kb/articles/q179/1/29.asp | Christey> MSKB:Q179129 | http://support.microsoft.com/support/kb/articles/q179/1/29.asp | Note that the hotfix name is teardrop2, but the keywords | included in the KB article specifically name bonk | (CVE-1999-0258) and boink. | Since teardrop2 was fixed in a slightly different version | (at least in a separate patch) than Teardrop, CD:SF-LOC | suggests keeping them separate. | Christey> Add period to the end of the description. | View |
105 | CVE-1999-0105 | Candidate | finger allows recursive searches by using a long string of @ symbols. | Proposed (19990726) | MODIFY(3) Baker, Frech, Shostack | NOOP(1) Christey | REJECT(1) Northcutt | Shostack> fingerD | Frech> XF:finger-bomb | Christey> aka redirection or forwarding requests? (but then might | overlap CVE-1999-0106) | Baker> should change description to indicate the recursive searching can consume enough system resources to cause a DoS. | View |
Page 21 of 20943, showing 5 records out of 104715 total, starting on record 101, ending on 105