CVE List

Id CVE No. Status Description Phase Votes Comments Actions
5074  CVE-2002-0684  Candidate  Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.  Modified (20040818)  ACCEPT(5) Baker, Cole, Foat, Green, Wall | MODIFY(2) Cox, Frech | NOOP(1) Christey  Cox> RHSA-2002:133 is CVE-2002-0651 not this one, ADDREF:RHSA-2002:167 | Christey> HP:HPSBUX0209-218 | URL:http://archives.neohapsis.com/archives/hp/2002-q3/0087.html | Frech> XF:dns-resolver-lib-bo(9432) | Christey> DELREF REDHAT:RHSA-2002:133 | Christey> DELREF REDHAT:RHSA-2002:133  View
5050  CVE-2002-0660  Candidate  Buffer overflow in libpng 1.0.12-3.woody.2 and libpng3 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0, and other operating systems, may allow attackers to cause a denial of service and possibly execute arbitrary code, a different vulnerability than CVE-2002-0728.  Modified (20041020)  ACCEPT(4) Armstrong, Baker, Cole, Wall | MODIFY(2) Cox, Frech | NOOP(2) Christey, Foat  Cox> No need to single out woody and Debian Linux, this affects | libpng that is used throughout Linux distributions. | Christey> CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt | Christey> Need to change desc a bit - say it"s 1.0.12, remove Debian | specifics. | XF:libpng-wide-image-bo(9790) | URL:http://www.iss.net/security_center/static/9790.php | BID:5409 | URL:http://www.securityfocus.com/bid/5409 | CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt | Frech> XF:libpng-wide-image-bo(9790) | Christey> Change "Debian Linux" to "Debian GNU/Linux"  View
5617  CVE-2002-1233  Candidate  A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131.  Modified (20050529)  ACCEPT(3) Armstrong, Cole, Green | NOOP(1) Cox  Cox> Many vendors have included fixes for CVE-2001-0131 in their distributions | of Apache even though this has not been fixed upstream. I still believe | that this is not worthy of a separate CVE name since this is just Debian | forgetting to include their fix for CVE-2001-0131 in one of their versions, | and then correcting it.  View
5227  CVE-2002-0837  Candidate  wordtrans 1.1pre8 and earlier in the wordtrans-web package allows remote attackers to (1) execute arbitrary code or (2) conduct cross-site scripting attacks via certain parameters (possibly "dict") to the wordtrans.php script.  Proposed (20030317)  ACCEPT(4) Armstrong, Cole, Cox, Green  Cox> I believe this to mean "multiple exploit vectors" for the single | vulnerability. The patch to correct this issue was a single line that | would remove any non-alphabetic characters from the "dict" parameter.  View
5239  CVE-2002-0849  Candidate  Linux-iSCSI iSCSI implementation installs the iscsi.conf file with world-readable permissions on some operating systems, including Red Hat Linux Limbo Beta #1, which could allow local users to gain privileges by reading the cleartext CHAP password.  Modified (20050610)  MODIFY(2) Foat, Frech | NOOP(4) Armstrong, Christey, Cole, Wall | REJECT(1) Cox  Cox> CD:EX-BETA | Foat> The candidate notes that this vulnerability pertains to "some | operating systems" and specifically mentions only Red Hat Linux Limbo Beta #1. | We found the file to be world readable on Red Hat Linux 7.2. | Frech> XF:linux-iscsi-conf-insecure(9792) | Christey> MISC:http://www.seifried.org/security/advisories/kssa-004.html  View

Page 252 of 20943, showing 5 records out of 104715 total, starting on record 1256, ending on 1260

Actions