CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4558  CVE-2002-0165  Candidate  LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162.  Modified (20020817-01)  ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall  Christey> XF:logwatch-tmp-race-condition(8652) | URL:http://www.iss.net/security_center/static/8652.php | CONFIRM:http://list.kaybee.org/archives/logwatch-announce/2002-March/000003.html | (notice how this is a different announcement than CVE-2002-0162) | Frech> XF:logwatch-tmp-race-condition(8652)  View
3813  CVE-2001-1009  Candidate  Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.  Modified (20020817-01)  ACCEPT(4) Armstrong, Baker, Cole, Green | MODIFY(1) Frech | NOOP(2) Foat, Wall  Frech> XF:fetchmail-signed-integer-index(6965)  View
3816  CVE-2001-1012  Candidate  Vulnerability in screen before 3.9.10, related to a multi-attach error, allows local users to gain root privileges when there is a subdirectory under /tmp/screens/.  Modified (20020817-01)  ACCEPT(2) Frech, Green | NOOP(4) Christey, Cole, Foat, Wall  Christey> Typo: "toa"  View
5118  CVE-2002-0728  Candidate  Buffer overflow in the progressive reader for libpng 1.2.x before 1.2.4, and 1.0.x before 1.0.14, allows attackers to cause a denial of service (crash) via a PNG data stream that has more IDAT data than indicated by the IHDR chunk.  Modified (20020817-01)  ACCEPT(4) Armstrong, Baker, Cole, Cox | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall  Christey> CONECTIVA:CLA-2002:512 | Christey> DEBIAN:DSA-140 | Add libpng2, libpng3 | Christey> REDHAT:RHSA-2002:152 (per Mark Cox) | Christey> Change desc: these are versions *before* 1.2.4, and *before* 1.0.14. | REDHAT:RHSA-2002:151 | Christey> XF:libpng-datastream-bo(9744) | URL:http://www.iss.net/security_center/static/9744.php | BID:5059 | URL:http://www.securityfocus.com/bid/5059 | Christey> CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt | Frech> XF:libpng-progressive-reader-bo(9744) | Christey> CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt  View
509  CVE-1999-0512  Candidate  A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.  Modified (20020427-01)  ACCEPT(3) Baker, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:smtp-sendmail-relay(210) | XF:ntmail-relay(2257) | XF:exchange-relay(3107) (also assigned to CVE-1999-0682) | XF:smtp-relay-uucp(3470) | XF:sco-sendmail-spam(4342) | XF:sco-openserver-mmdf-spam(4343) | XF:lotus-domino-smtp-mail-relay(6591) | XF:win2k-smtp-mail-relay(6803) | XF:cobalt-poprelayd-mail-relay(6806) | | Candidate implicitly may refer to relaying settings enabled by default, or | the bypass/circumvention of relaying. Both interpretations were used in | assigning this candidate. | Christey> The intention of this candidate is to cover configurations in | which the admin has explicitly enabled relaying. Other cases | in which the application *intends* to prvent relaying, but | there is some specific input that bypasses/tricks it, count | as vulnerabilities (or exposures?) and as such would be | assigned different numbers. | | http://www.sendmail.org/~ca/email/spam.html seems like a good | general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt | Christey> I changed the description to make it more clear that the issue | is that of explicit configuration, as opposed to being the | result of a vulnerability.  View

Page 548 of 20943, showing 5 records out of 104715 total, starting on record 2736, ending on 2740

Actions