CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4558 | CVE-2002-0165 | Candidate | LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162. | Modified (20020817-01) | ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Christey> XF:logwatch-tmp-race-condition(8652) | URL:http://www.iss.net/security_center/static/8652.php | CONFIRM:http://list.kaybee.org/archives/logwatch-announce/2002-March/000003.html | (notice how this is a different announcement than CVE-2002-0162) | Frech> XF:logwatch-tmp-race-condition(8652) | View |
3813 | CVE-2001-1009 | Candidate | Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request. | Modified (20020817-01) | ACCEPT(4) Armstrong, Baker, Cole, Green | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF:fetchmail-signed-integer-index(6965) | View |
3816 | CVE-2001-1012 | Candidate | Vulnerability in screen before 3.9.10, related to a multi-attach error, allows local users to gain root privileges when there is a subdirectory under /tmp/screens/. | Modified (20020817-01) | ACCEPT(2) Frech, Green | NOOP(4) Christey, Cole, Foat, Wall | Christey> Typo: "toa" | View |
5118 | CVE-2002-0728 | Candidate | Buffer overflow in the progressive reader for libpng 1.2.x before 1.2.4, and 1.0.x before 1.0.14, allows attackers to cause a denial of service (crash) via a PNG data stream that has more IDAT data than indicated by the IHDR chunk. | Modified (20020817-01) | ACCEPT(4) Armstrong, Baker, Cole, Cox | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Christey> CONECTIVA:CLA-2002:512 | Christey> DEBIAN:DSA-140 | Add libpng2, libpng3 | Christey> REDHAT:RHSA-2002:152 (per Mark Cox) | Christey> Change desc: these are versions *before* 1.2.4, and *before* 1.0.14. | REDHAT:RHSA-2002:151 | Christey> XF:libpng-datastream-bo(9744) | URL:http://www.iss.net/security_center/static/9744.php | BID:5059 | URL:http://www.securityfocus.com/bid/5059 | Christey> CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt | Frech> XF:libpng-progressive-reader-bo(9744) | Christey> CALDERA:CSSA-2002-042.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-042.0.txt | View |
509 | CVE-1999-0512 | Candidate | A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | Modified (20020427-01) | ACCEPT(3) Baker, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:smtp-sendmail-relay(210) | XF:ntmail-relay(2257) | XF:exchange-relay(3107) (also assigned to CVE-1999-0682) | XF:smtp-relay-uucp(3470) | XF:sco-sendmail-spam(4342) | XF:sco-openserver-mmdf-spam(4343) | XF:lotus-domino-smtp-mail-relay(6591) | XF:win2k-smtp-mail-relay(6803) | XF:cobalt-poprelayd-mail-relay(6806) | | Candidate implicitly may refer to relaying settings enabled by default, or | the bypass/circumvention of relaying. Both interpretations were used in | assigning this candidate. | Christey> The intention of this candidate is to cover configurations in | which the admin has explicitly enabled relaying. Other cases | in which the application *intends* to prvent relaying, but | there is some specific input that bypasses/tricks it, count | as vulnerabilities (or exposures?) and as such would be | assigned different numbers. | | http://www.sendmail.org/~ca/email/spam.html seems like a good | general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt | Christey> I changed the description to make it more clear that the issue | is that of explicit configuration, as opposed to being the | result of a vulnerability. | View |
Page 548 of 20943, showing 5 records out of 104715 total, starting on record 2736, ending on 2740