CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4902  CVE-2002-0510  Candidate  The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux.  Proposed (20020611)  ACCEPT(3) Foat, Frech, Green | NOOP(3) Cole, Cox, Wall  CHANGE> [Cox changed vote from REVIEWING to NOOP] | Cox> So I asked some kernel guys about this - it"s not considered | an issue. There are several other ways to identify Linux on | the wire and people who care about this kind of thing rewrite | their packets in various ways via firewall technology to trick | the identifier programs.  View
5890  CVE-2002-1506  Candidate  Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.  Proposed (20030317)  ACCEPT(1) Cole | NOOP(2) Cox, Wall  CHANGE> [Cox changed vote from REVIEWING to NOOP]  View
5669  CVE-2002-1285  Candidate  runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments.  Proposed (20030317)  ACCEPT(3) Armstrong, Cole, Green | MODIFY(1) Cox  CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> LPRng does not contain anything called runlpr, and in fact if you | look at the packages SuSE say that they ship as part of the erratum they | don"t even provide updated LPRng packages. However they do ship lprfilter | packages and looking inside them I find that they are what contain this | runlpr program: | | http://at.rpmfind.net/opsys/linux/RPM/suse.com/i386/update/8.0/ap1/lpdfilter-0.42-155.i386.html | | This states that lpdfilter is a collection of scripts written by SuSE, and | the changelog even highlights this is where the security fix was made. | Therefore I believe that the CVE reference and all the descriptions of | this vulnerability, which are based on a bad advisory description from | SuSE, are also wrong, it should be: | | "runlpr from the SuSE lpdfilter package allows the local lp user to gain | root privileges via certain command line arguments."  View
4164  CVE-2001-1360  Candidate  Vulnerability in Scanner Access Now Easy (SANE) before 1.0.5, related to pnm and saned.  Proposed (20020611)  ACCEPT(3) Alderson, Cole, Green | MODIFY(2) Cox, Frech | NOOP(2) Foat, Wall  CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> I"m not sure how to vote on this, I did the research and read | the changlog and it appears that the issue you mention here has not | been fixed at all; merely documented as of sane version 1.0.5 | | Change description based on the information in the Sane tarball; note that | this affects all versions to date and is not fixed. | | ---cut--- | | - Security problems with pnm | If the pnm backend is installed and saned is used to allow users on | remote computers to scan on the local machine, pnm files can be read by | the remote user. This is limited to the files saned can access (usually | it"s running as user "sane"). All pnm files can be read if saned runs | as root which isn"t recommended anyway. The pnm backend is disabled | by default. If you want to use it, enable it with configure (see | configure --help for details). Be sure that only trusted users can | access the pnm backend over saned. | | ---cut--- | Frech> XF:sane-prm-read-files(9853)  View
4632  CVE-2002-0240  Candidate  PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.  Proposed (20020502)  ACCEPT(2) Baker, Frech | MODIFY(1) Cox | NOOP(4) Armstrong, Cole, Foat, Wall  CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> Change to "....installed with Apache 2.0 for Windows"  View

Page 351 of 20943, showing 5 records out of 104715 total, starting on record 1751, ending on 1755

Actions