CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4493 | CVE-2002-0099 | Candidate | Buffer overflow in Michael Lamont Savant Web Server 3.0 allows remote attackers to cause a denial of service (crash) via a long HTTP request to the cgi-bin directory in which the CGI program name contains a large number of . (dot) characters. | Modified (20020911-01) | ACCEPT(2) Frech, Green | NOOP(4) Cole, Foat, Wall, Ziese | REVIEWING(1) Christey | Christey> Should CVE-2002-0099 and/or CVE-2001-0433 be MERGED with | CVE-2000-0641? All describe slightly different overflows | that, perhaps, should be merged according to CD:SF-LOC. | It depends on which versions are affected, which would require | some vendor acknowledgement or consultation. | | A vague changelog for version 3.1 at | http://sourceforge.net/project/shownotes.php?release_id=75333 says | "security fixes" but it"s not clear *which* security fixes | were made. | | The description for CVE-2000-0641 is slightly incorrect. The | exploit is clearly due to a large number of headers, not | arguments to the GET request itself. So, CVE-2000-0641 | clearly overlaps with CVE-2001-0433. | | The exploit for CVE-2001-0433 also doesn"t really have | anything to do with a "cgi-test.pl" program (which isn"t in | the distribution). The discloser simply used that as an | example program of a long request. | Christey> Modify description so that overflow is described as being | part of the CGI module (so it appears). | | Also, Tamer Sahin confirmed via email (9/11/02) that the | problem was explicitly exhibited using a large number of | . (dot) characters. | View |
643 | CVE-1999-0661 | Candidate | A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6. | Modified (20050529) | ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey | Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only. | View |
6930 | CVE-2003-0101 | Candidate | miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges. | Modified (20080207) | ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox | Christey> SGI:20030602-01-I | The "websetup v 3.5 package from IRIX 6.5.20 Applications CD" | uses Webmin; may wish to add this name to the description. | Christey> DEBIAN:DSA-319 | Christey> CIAC:N-058 | URL:http://www.ciac.org/ciac/bulletins/n-058.shtml | ENGARDE:ESA-20030225-006 | URL:http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0008.html | HP:HPSBUX0303-250 | URL:http://archives.neohapsis.com/archives/hp/2003-q1/0063.html | BID:6915 | URL:http://www.securityfocus.com/bid/6915 | View |
4557 | CVE-2002-0164 | Candidate | Vulnerability in the MIT-SHM extension of the X server on Linux (XFree86) 4.2.1 and earlier allows local users to read and write arbitrary shared memory, possibly to cause a denial of service or gain privileges. | Modified (20100521) | ACCEPT(5) Armstrong, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(2) Christey, Foat | Christey> SGI:20021001-01-P | Christey> BUGTRAQ:20021024 GLSA: xfree | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103547625009363&w=2 | | This Gentoo advisory mentions XFree86 4.2.0-r12 and earlier. | Frech> XF:xfree86-mitshm-memory-access(8706) | Christey> REDHAT:RHSA-2003:067 | URL:http://www.redhat.com/support/errata/RHSA-2003-067.html | Christey> Add something like "Xfree86 before 4.2.1" to the description. | | The affected versions aren"t quite clear, as various vendor | advisories list different versions. | Christey> DEBIAN:DSA-380 | Christey> CALDERA:CSSA-2003-SCO.26 | View |
4868 | CVE-2002-0476 | Candidate | Standalone Macromedia Flash Player 5.0 allows remote attackers to save arbitrary files and programs via a .SWF file containing the undocumented "save" FSCommand. | Proposed (20020611) | ACCEPT(5) Baker, Cole, Frech, Green, Wall | NOOP(2) Cox, Foat | REVIEWING(1) Christey | Christey> See comments for CVE-2002-0477. | View |
Page 290 of 20943, showing 5 records out of 104715 total, starting on record 1446, ending on 1450