CVE List

Id CVE No. Status Description Phase Votes Comments Actions
433  CVE-1999-0434  Candidate  XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.  Proposed (19990728)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:xfree86-xfs-symlink-dos | Christey> Is this the same problem as CVE-1999-0433? CVE-1999-0433 | deals with a symlink attack on one file (/tmp/.X11-unix), | while xfs (this candidate) deals with /tmp/.font-unix | XF:xfree86-xfs-symlink-dos doesn"t exist. | Christey> ADDREF DEBIAN:19990331 symbolic link can be used to make any file world readable | Note: Debian"s advisory says that this is not a problem for Debian.  View
442  CVE-1999-0443  Candidate  Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.  Proposed (19990728)  ACCEPT(1) Baker | MODIFY(1) Frech  Frech> Change "Patrol management software" to "The PATROL management product from | BMC Software".  View
453  CVE-1999-0454  Candidate  A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.  Proposed (19990728)  MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(2) Baker, Northcutt  Northcutt> Nmap and queso are the tip of the iceberg and not the most advanced | ways to accomplish this. To pursue making the world signature free | is as much a vulnerability as having signatures, nay more. | Frech> XF:decod-nmap(2053) | XF:decod-queso(2048) | Christey> Add "fingerprinting" to facilitate search. | Some references: | MISC:http://www.insecure.org/nmap/nmap-fingerprinting-article.html | BUGTRAQ:19981228 A few more fingerprinting techniques - time and netmask | http://marc.theaimsgroup.com/?l=bugtraq&m=91489155019895&w=2 | BUGTRAQ:19990222 Preventing remote OS detection | http://marc.theaimsgroup.com/?l=bugtraq&m=91971553006937&w=2 | BUGTRAQ:20000901 ICMP Usage In Scanning v2.0 - Research Paper | http://marc.theaimsgroup.com/?l=bugtraq&m=96791499611849&w=2 | BUGTRAQ:20000912 Using the Unused (Identifying OpenBSD, | http://marc.theaimsgroup.com/?l=bugtraq&m=96879267724690&w=2 | BUGTRAQ:20000912 The DF Bit Playground (Identifying Sun Solaris & OpenBSD OSs) | http://marc.theaimsgroup.com/?l=bugtraq&m=96879481129637&w=2 | BUGTRAQ:20000816 TOSing OSs out of the window / Fingerprinting Windows 2000 with | http://marc.theaimsgroup.com/?l=bugtraq&m=96644121403569&w=2 | BUGTRAQ:20000609 p0f - passive os fingerprinting tool | http://marc.theaimsgroup.com/?l=bugtraq&m=96062535628242&w=2 | Baker> I think we can probably reject this as the corollary is that you can identify OS from a IP/TCP packet sent by a system, looking at various parts of the SYN packet. Unless we believe that all systems should always use identical packet header/identical responses, in which case the protocol should not permit variation.  View
457  CVE-1999-0459  Candidate  Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.  Proposed (19990728)  ACCEPT(1) Frech | NOOP(2) Baker, Northcutt | REJECT(1) Wall  Wall> Reject based on beta copy.  View
459  CVE-1999-0461  Candidate  Versions of rpcbind including Linux, IRIX, and Wietse Venema"s rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.  Proposed (19990728)  MODIFY(1) Frech | RECAST(1) Baker | REVIEWING(1) Christey  Frech> ADDREF XF:pmap-sset | Christey> CVE-1999-0195 = CVE-1999-0461 ? | If this is approved over CVE-1999-0195, make sure it gets | XF:pmap-sset | Baker> THis does appear to be a duplicate. We should accept 1999-0195, since it already has the votes and get rid of this one  View

Page 408 of 20943, showing 5 records out of 104715 total, starting on record 2036, ending on 2040

Actions