CVE List

Id CVE No. Status Description Phase Votes Comments Actions
964  CVE-1999-0984  Candidate  Matt"s Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.  Proposed (19991214)  ACCEPT(2) Blake, Stracener | MODIFY(1) Frech | NOOP(2) Baker, Cole | REVIEWING(1) Christey  Cole> How is this different than the previous? | Christey> More examination is required to determine if CVE-1999-0983, | CVE-1999-0984, or CVE-1999-0985 are the same codebase. | Frech> XF:matts-whois-meta | Christey> ADDREF BID:2000 | Christey> XF reference is gone. Replace with http-cgi-matts-whois-meta(3799) ?  View
965  CVE-1999-0985  Candidate  CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.  Proposed (19991214)  ACCEPT(2) Blake, Stracener | MODIFY(1) Frech | NOOP(2) Baker, Cole | REVIEWING(1) Christey  Cole> I would combine all of these. | Christey> More examination is required to determine if CVE-1999-0983, | CVE-1999-0984, or CVE-1999-0985 are the same codebase. | Frech> XF:cc-whois-meta | Christey> ADDREF BID:2000 | Frech> Change cc-whois-meta(3800) to http-cgi-ccwhois(3747) | Christey> Replace XF reference with XF:cc-whois-meta(3800) ?  View
728  CVE-1999-0748  Candidate  Buffer overflows in Red Hat net-tools package.  Proposed (19991214)  ACCEPT(4) Armstrong, Baker, Cole, Stracener | MODIFY(1) Frech | REJECT(1) Blake  Blake> RHSA-1999:017-01 describes "potential security problem fixed" in the | absence of knowing whether or not the problems actually existed, I don"t | think we have an entry here. | Frech> XF:redhat-net-tool-bo  View
747  CVE-1999-0767  Candidate  Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable.  Proposed (19991214)  ACCEPT(4) Baker, Blake, Cole, Dik | MODIFY(2) Frech, Stracener | REVIEWING(2) Christey, Prosser  Stracener> Add Ref: CIAC: J-069 | Frech> XF:sun-libc-lcmessages | Prosser> BID 268 is an additional reference for this one as it has info on the Sun | vulnerability. However, BID 268 also includes AIX in this vulnerability and | refs APARS issued to fix a vulnerability in various "nixs with the Natural | Language Service environmental variables NSLPATH and PATH_LOCALE depending | on the "nix, ref CERT CA-97.10, CVE-1999-0041. However, Georgi Guninski | reported a BO in AIX with LC_MESSAGES + mount, also refed in BID 268, so it | is possible the AIX APARs fix an earlier, similar vulnerability to the Sun | BO in LC_MESSAGES. This should probably be considered under a different | CAN. Any ideas? | Christey> Given that the buffer overflows in CVE-1999-0041 are NLSPATH | and PATH_LOCALE, I"d say that"s good evidence that this is not | the same problem. But a buffer overflow in libc in | LC_MESSAGES... We must ask if these are basically the same | codebase. | | ADDREF CIAC:J-069 | Christey> While the description indicates multiple programs, CD:SF-EXEC | does not apply because the vulnerability was in libc, and | rcp and ufsrestore were both statically linked against libc. | Thus CD:SF-LOC applies, and a single candidate is maintained | because the problem occurred in a library. | Dik> Sun bug 4240566 | Christey> I"m consulting with Casper Dik and Troy Bollinger to see if | this should be combined with the AIX buffer overflows for | LC_MESSAGES; current indications are that they should be | split. | Christey> For further consultation, consider this post, though it"s | associated with CVE-1999-0041: | BUGTRAQ:19970213 Linux NLSPATH buffer overflow | http://www.securityfocus.com/archive/1/6296 | Also add "NLSPATH" and "PATH_LOCALE" to the description to | facilitate search.  View
756  CVE-1999-0776  Candidate  Alibaba HTTP server allows remote attackers to read files via a .. (dot dot) attack.  Proposed (19991214)  ACCEPT(4) Frech, Levy, Ozancin, Stracener | MODIFY(1) Baker | NOOP(6) Armstrong, Blake, Cole, Landfield, LeBlanc, Wall | REVIEWING(1) Christey  Christey> This candidate is unconfirmed by the vendor. | | Posted by Arne Vidstrom. | Blake> I"d like to change my vote on this from ACCEPT to NOOP. I did some | digging and the vendor seems to have discontinued the product, so no | information is available beyond Arne"s post. Unless Andre has a copy | in his archive and can test it, I think we have to leave it out. | Wall> I agree with Blake. We have not seen the product and it has been discontinued. | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> If this is (or was) tested by some tool, we should ACCEPT it. | Baker> http://www.securityfocus.com/bid/270 | Christey> BID:270 | URL:http://www.securityfocus.com/bid/270  View

Page 390 of 20943, showing 5 records out of 104715 total, starting on record 1946, ending on 1950

Actions