CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
810 | CVE-1999-0830 | Candidate | Buffer overflow in SCO UnixWare Xsco command via a long argument. | Proposed (19991208) | ACCEPT(3) Armstrong, Baker, Stracener | MODIFY(3) Cole, Frech, Prosser | REVIEWING(1) Christey | Cole> This is BID 824 and the BUGTRAQ reference is 19991125. | Frech> XF:sco-unixware-xsco | Christey> Confirmed by vendor, albeit vaguely: | http://marc.theaimsgroup.com/?l=bugtraq&m=94581379905584&w=2 | | Prosser> agree with Steve on vendor confirmation, however not sure the | fix ref"d in BID 824 (SSE041) is right. It lists fixes for libnsl and | tcpip.so, nothing about xsco. SSE050b | (ftp://ftp.sco.com/SSE/security_bulletins/SB-99.26b) fixes a buffer overflow | in xsco on OpenServer (the vendor message Steve refers to) but not the | UnixWare vulnerability reported on Bugtraq and in BID824. Anyone more | familar with SCO shed some light on this? Are they the same codebase so fix | would be same? From the SCO site it seems the UnixWare and OpenSever | products are similar but have differences. | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> BID:824 | http://www.securityfocus.com/bid/824 | View |
823 | CVE-1999-0843 | Candidate | Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port. | Proposed (19991208) | ACCEPT(3) Balinsky, Cole, Stracener | MODIFY(1) Frech | NOOP(2) Armstrong, Baker | REVIEWING(3) Christey, Prosser, Ziese | Frech> XF:cisco-nat-dos | Christey> Mike Prosser"s REVIEWING vote expires July 17, 2000 | Ziese> After reviewing | http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml | I can not confirm this exists unless it"s restructred to | describe a problem against IOS per se; not NAT per se. I am | reviewing this and it may take some time. | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Not sure if Kevin"s suggested reference really describes this | one. However, a followup email by Jim Duncan of Cisco does | acknowledge the problem as discussed in the Bugtraq post: | http://marc.theaimsgroup.com/?l=vuln-dev&m=94385601831585&w=2 | The original post is: | http://marc.theaimsgroup.com/?l=bugtraq&m=94184947504814&w=2 | | It could be that the researcher believed that the problem was | NAT, but in fact it wasn"t. | | I need to follow up with Ziese/Balinsky on this one. | View |
824 | CVE-1999-0844 | Candidate | Denial of service in MDaemon WorldClient and WebConfig services via a long URL. | Proposed (19991208) | ACCEPT(2) Baker, Stracener | MODIFY(2) Cole, Frech | NOOP(1) Armstrong | RECAST(1) Christey | REVIEWING(1) Prosser | Cole> 823 and 820 are two different vulnerabilities and should be | separated out. They are both buffer overflows but accomplish it in a | different fashion and the end exploit is different. | Frech> (RECAST?) | XF:mdaemon-worldclient-dos | XF:mdaemon-webconfig-dos | Recast request: This is really two services exhibiting the same problem. | Christey> as suggested by others. | | Also see confirmation at: | http://mdaemon.deerfield.com/helpdesk/hotfix.cfm | View |
825 | CVE-1999-0845 | Candidate | Buffer overflow in SCO su program allows local users to gain root access via a long username. | Proposed (19991208) | ACCEPT(4) Armstrong, Cole, Prosser, Stracener | MODIFY(1) Frech | RECAST(1) Baker | REVIEWING(1) Christey | Christey> DUPE CVE-1999-0317? | Frech> XF:sco-su-username-bo | Christey> ADDREF BID:826 | CONFIRM:ftp://ftp.sco.com/SSE/sse039.tar.Z | View |
826 | CVE-1999-0846 | Candidate | Denial of service in MDaemon 2.7 via a large number of connection attempts. | Proposed (19991208) | ACCEPT(5) Armstrong, Baker, Cole, Prosser, Stracener | MODIFY(1) Frech | REVIEWING(1) Christey | Frech> XF:mdaemon-dos | Christey> CVE-1999-0844 is confirmed by MDaemon at | http://mdaemon.deerfield.com/helpdesk/hotfix.cfm but there | is no apparent confirmation for this problem, even | though it was posted the same day. | Prosser> Looks like from a follow-on message on Bugtraq from Nobuo | <http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-11-28&msg=199912011604.HJI39569.BX-NOJ@lac.co.jp> Deerfield sent a reply about the | DoS problems in MDaemon 2.8.5, that also talks about fixing the 2.7 J DoS | that Nobuo initially reported. Can"t find the original message, so may have | been limited distro. Looks like an upgrade to the latest release might be | the final solution here. | View |
Page 392 of 20943, showing 5 records out of 104715 total, starting on record 1956, ending on 1960