CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2412 | CVE-2000-0843 | Candidate | Buffer overflow in pam_smb and pam_ntdom pluggable authentication modules (PAM) allow remote attackers to execute arbitrary commands via a login with a long user name. | Proposed (20001018) | ACCEPT(4) Armstrong, Baker, Collins, Magdych | MODIFY(1) Frech | NOOP(3) Christey, Cole, Wall | Magdych> ACKNOWLEDGED-BY-VENDOR | Christey> ADDREF XF:pam-authentication-bo | Frech> XF:pam-authentication-bo(5225) | View |
2138 | CVE-2000-0562 | Candidate | BlackIce Defender 2.1 and earlier, and BlackIce Pro 2.0.23 and earlier, do not properly block Back Orifice traffic when the security setting is Nervous or lower. | Proposed (20000712) | ACCEPT(3) Armstrong, Cole, Levy | MODIFY(2) Baker, Frech | NOOP(1) Ozancin | REVIEWING(1) Christey | Levy> What do others think? Should this be a vuln? I can see the argument | that some features are simply not available unless you use the maximum | security settings. | Christey> At the very least, this needs to be modified to state that | this problem/concern applies to high ports in general, not | just Back orifice. | | The Bugtraq poster claims that BlackICE "shuts down" the port, | but only *after* some initial traffic "leaks" out. This may | be by design, but it does mean that there is a small window | of opportunity in which BlackICE may not work "as | advertised," even at lower security settings. | Christey> XF:blackice-security-level-nervous | BID:1389 | Frech> XF:blackice-security-level-nervous(4777) | CHANGE> [Levy changed vote from REVIEWING to ACCEPT] | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Baker> I accept it more as a security exposure, than a real vulnerability. | It performs just as any other "firewall" or IDS product can be configured to | allow traffic without notifying the user. You can adjust settings on | any product that allow traffic that other people or organizations would | find unacceptable. So, as long as it is reflected that this is more of | a configuration that allows such traffic as opposed to a defective | or improperly functioning software issue, I don"t have a problem with | it. | View |
2376 | CVE-2000-0800 | Candidate | String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges. | Proposed (20000921) | ACCEPT(1) Cole | MODIFY(2) Frech, Levy | NOOP(2) Baker, Wall | REJECT(1) Christey | Levy> This is the same as other Linux vendors statd format string problem. | | Reference: BID 1480 | Christey> If this is the same as the other statd format string problems, | then this is a duplicate of CVE-2000-0666. | Frech> XF:linux-rpcstatd-format-overwrite(4939) | CHANGE> [Christey changed vote from REVIEWING to REJECT] | Christey> OK, I agree that this is a dupe of CVE-2000-0666. | Here"s why: | | BUGTRAQ:20000803 SuSE Security: miscellaneous | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=96540330329127&w=2 | | One statement says "The SuSE package containing rpc.kstatd | (other vendors named it rpc.statd)... An updated package is | currently being tested." | View |
2101 | CVE-2000-0524 | Candidate | Microsoft Outlook and Outlook Express allow remote attackers to cause a denial of service by sending email messages with blank fields such as BCC, Reply-To, Return-Path, or From. | Proposed (20000712) | MODIFY(3) Frech, LeBlanc, Levy | NOOP(1) Ozancin | RECAST(1) Wall | Levy> There was plenty of people that could not reproduce the problem although | some did. More research (as in actual testing) is probably required. | LeBlanc> This entry does not specify which versions of Outloook are vulnerable, nor | is that clear from the BUGTRAQ record. It is much too broad to say just | "Outlook" when it is definately not all versions of Outlook. The problem | appears confined to some version of Outlook 97, and if I recall correctly, | there has been a patch for this for quite some time. | Frech> XF:outlook-header-dos(4645) | CHANGE> [Wall changed vote from REVIEWING to RECAST] | Wall> UNABLE TO DUPLICATE | View |
2310 | CVE-2000-0734 | Candidate | eEye IRIS 1.01 beta allows remote attackers to cause a denial of service via a large number of UDP connections. | Proposed (20000921) | MODIFY(1) Levy | NOOP(2) Cole, Wall | REJECT(1) Frech | Levy> The product is in wide use even while is in beta. eEye brought another company and made all their previous customers upgrade to the new software. | View |
Page 30 of 20943, showing 5 records out of 104715 total, starting on record 146, ending on 150