CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4423 | CVE-2002-0029 | Candidate | Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. | Modified (20060523) | ACCEPT(3) Baker, Cole, Frech | MODIFY(1) Cox | NOOP(2) Christey, Wall | CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> ADDREF: REDHAT: http://rhn.redhat.com/cve/CVE-2002-0029.html | Christey> the redhat reference is REDHAT:RHSA-2004:383 | View |
4202 | CVE-2001-1399 | Candidate | Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86." | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-x86-asm-copy(11170) | View |
4203 | CVE-2001-1400 | Candidate | Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock). | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-udp-port-dos(11171) | View |
4200 | CVE-2001-1397 | Candidate | The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory. | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-sys5-shm(11168) | View |
4199 | CVE-2001-1396 | Candidate | Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact. | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-strnlen-user(11167) | View |
Page 352 of 20943, showing 5 records out of 104715 total, starting on record 1756, ending on 1760