CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1911  CVE-2000-0333  Candidate  tcpdump, Ethereal, and other sniffer packages allow remote attackers to cause a denial of service via malformed DNS packets in which a jump offset refers to itself, which causes tcpdump to enter an infinite loop while decompressing the packet.  Proposed (20000518)  ACCEPT(3) Armstrong, Baker, Levy | MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:sniffer-dns-decode-dos  View
1921  CVE-2000-0343  Candidate  Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.  Proposed (20000518)  ACCEPT(2) Cole, Levy | MODIFY(2) Christey, Frech | NOOP(2) Armstrong, Wall  Frech> XF:sniffit-lmail-bo | Christey> This issue was rediscovered. | ADDREF BUGTRAQ:20020119 remote buffer overflow in sniffit | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=101167452712383&w=2 | ADDREF BUGTRAQ:20000525 `sniffit -L mail" vulnerabilities | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=95928090612990&w=2 | | I reviewed the patch that was claimed in the 20020119 Bugtraq | post, and it could well address the issue. However, since the | patch is also dated around the time of the original Bugtraq | post, *and* it says that it"s addressing an issue that"s | discussed on Bugtraq, that is sufficient to establish | acknowledgement. | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> XF:sniffit-normmail-l-bo(7933) | URL:http://www.iss.net/security_center/static/7933.php  View
1923  CVE-2000-0345  Candidate  The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.  Proposed (20000518)  ACCEPT(1) Prosser | MODIFY(1) Frech | NOOP(5) Armstrong, Baker, Cole, Levy, Wall | REJECT(1) Balinsky  Levy> Arguably this is not a vulnerability. Cisco replying saying this | is standard behaviour that was simply not well documented. They have | no plans to change it and will simply document it better. | Frech> XF:cisco-online-help | Balinsky> As noted in a bugtraq posting by Lisa Napier from Cisco"s Product Security Incident Response Team, this is a poorly documented feature. This is intended behavior, and does not represent a vulnerability in Cisco"s opinion. | http://www.securityfocus.com/frames/?content=/templates/archive.pike?list=1&mid=59434 | Prosser> Although Lisa Napier did say this issue was "functioning as designed", it was not intended to allow unprivileged access. Lisa did indicate that Cisco would be updating instructions on configuration to ensure proper user privileges. So, this should be considered IMHO an "exposure" vice a vulnerability, but security-related none the less. | http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000502222246.28423.qmail@securityfocus.com | | http://www.securityfocus.com/bid/1161  View
1828  CVE-2000-0250  Candidate  The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.  Proposed (20000426)  ACCEPT(2) Baker, Levy | MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:qnx-weak-encryption(4866)  View
1837  CVE-2000-0259  Candidate  The default permissions for the CryptographyOffload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.  Proposed (20000426)  ACCEPT(4) Baker, Cole, Levy, Wall | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:winnt-cryptkeys-compromise | Christey> Include "CryptoAPI" to facilitate search. | MSKB:Q259496 | URL:http://www.microsoft.com/technet/support/kb.asp?ID=259496  View

Page 367 of 20943, showing 5 records out of 104715 total, starting on record 1831, ending on 1835

Actions