CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
580 | CVE-1999-0598 | Candidate | A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection. | Proposed (19990726) | ACCEPT(3) Armstrong, Baker, Northcutt | NOOP(1) Frech | REVIEWING(1) Christey | Frech> Waiting for CIEL. | Christey> This is a design flaw, along with the other reported IDS | problems; at least reference Ptacek/Newsham"s paper. | Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html | View |
581 | CVE-1999-0599 | Candidate | A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers. | Proposed (19990726) | ACCEPT(2) Baker, Northcutt | NOOP(1) Frech | REVIEWING(1) Christey | Frech> Waiting for CIEL. | Christey> This is a design flaw, along with the other reported IDS | problems; at least reference Ptacek/Newsham"s paper. | Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html | View |
582 | CVE-1999-0600 | Candidate | A network intrusion detection system (IDS) does not verify the checksum on a packet. | Proposed (19990726) | ACCEPT(2) Baker, Northcutt | NOOP(1) Frech | REVIEWING(1) Christey | Frech> Waiting for CIEL. | Christey> This is a design flaw, along with the other reported IDS | problems; at least reference Ptacek/Newsham"s paper. | Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html | View |
584 | CVE-1999-0602 | Candidate | A network intrusion detection system (IDS) does not properly reassemble fragmented packets. | Proposed (19990726) | ACCEPT(2) Baker, Northcutt | NOOP(1) Frech | REVIEWING(1) Christey | Frech> Waiting for CIEL. | Christey> This is a design flaw, along with the other reported IDS | problems; at least reference Ptacek/Newsham"s paper. | Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html | View |
1820 | CVE-2000-0242 | Candidate | WindMail allows remote attackers to read arbitrary files or execute commands via shell metacharacters. | Proposed (20000412) | ACCEPT(2) Cole, Levy | NOOP(1) Baker | RECAST(1) Frech | REJECT(2) Christey, Magdych | Frech> Violation of fundamentum divisionis (that is, it"s more than one issue) and | a potential nitpick: | - windmail-fileread: allows remote attackers to read arbitrary files | - windmail-pipe-command: execute commands via shell metacharacters | - The conjunction "or" should be "and", if you decide to stick with one CAN. | Christey> As Andre basically said without naming content decisions, | CD:SF-LOC says this should be split. | | HOWEVER - the author of the product says that WindMail isn"t | supposed to be a CGI script, and says that the pipe | character problem is not related to Geocel. So should CVE | record when someone runs a program that wasn"t intended to | be a CGI? There may be a level of abstraction issue here. | Note that Perl and shell interpreters in CGI-BIN are | already mentioned in CVE-1999-0509. If we want to include | "using a program that wasn"t designed to be a CGI" as a | problem, we should have a separate candidate. | | See the author"s comments at: | http://www.securityfocus.com/templates/archive.pike?list=1&msg=3.0.5.32.20000331114325.013af680@mailhost.geocel.com | | which also claims that the original announcer hasn"t provided | any more details after the author was unable to reproduce the | problem. | CHANGE> [Magdych changed vote from REVIEWING to REJECT] | Magdych> After reviewing the author"s comments, I"m inclined to think that this is more of a misconfiguration than a vulnerability. | View |
Page 219 of 20943, showing 5 records out of 104715 total, starting on record 1091, ending on 1095