CVE List

Id CVE No. Status Description Phase Votes Comments Actions
2120  CVE-2000-0543  Candidate  The command port for PGP Certificate Server 2.5.0 and 2.5.1 allows remote attackers to cause a denial of service if their hostname does not have a reverse DNS entry and they connect to port 4000.  Modified (20001010-1)  ACCEPT(5) Baker, Cole, Collins, Levy, Ozancin | MODIFY(1) Frech | NOOP(1) Armstrong | REVIEWING(1) Christey  Christey> XF:pgp-cert-server-dos | Frech> XF:pgp-cert-server-dos(4695) | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Need to consult Jim Magdych on this one.  View
2268  CVE-2000-0692  Candidate  ISS RealSecure 3.2.1 and 3.2.2 allows remote attackers to cause a denial of service via a flood of fragmented packets with the SYN flag set.  Modified (20001010-1)  ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey  Frech> XF:realsecure-rskill-dos | Christey> CHANGEREF XF:realsecure-rskill-dos to XF:realsecure-frag-syn-dos? | http://xforce.iss.net/static/5133.php | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> In an email to issforum@iss.net on September 7, 2000, ISS says | that Network Sensor 3.2.2 is affected by SYN flooding, but | RealSecure 5.0 is not affected by Syn flooding. In addition, | they could not find conclusive evidence that RS 3.2.2 or 5.0 | was affected by IP fragmentation. This seems to indicate | that there are 2 *possible* problems: syn flooding (acknowledged | by ISS) and fragmentation (unconfirmed). Perhaps this | candidate needs to be split, or its description should be | rewritten to separate the 2 reported problems. | Frech> XF:realsecure-rskill-dos(5133)  View
212  CVE-1999-0213  Candidate  libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.  Modified (20001009-01)  ACCEPT(6) Blake, Cole, Dik, Hill, Landfield, Ozancin | MODIFY(3) Baker, Frech, Levy | NOOP(4) Armstrong, Bishop, Meunier, Wall | REVIEWING(1) Christey  Frech> XF:sun-libnsl | Dik> Sun bug #4305859 | Baker> http://xforce.iss.net/static/1204.php Misc Defensive Info | http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/172&type=0&nav=sec.sba Vendor Info | http://www-1.ibm.com/services/continuity/recover1.nsf/advisories/A1050E354364BF498525680F0077E414/$file/ERS-OAR-E01-1998_074_1.txt Vendor Info | http://www.securityfocus.com/archive/1/9749 Misc Defensive Info | Christey> I don"t think this is the bug that everyone thinks it is. | This candidate came from CyberCop Scanner 2.4/2.5, which | only reports this as a DoS problem. If SUN:00172 is an | advisory for this, then it may be a duplicate of | CVE-1999-0055. There appears to be overlap with other | references as well. HOWEVER, this particular one deals with a | DoS in rpcbind - which isn"t mentioned in the sources for | CVE-1999-0055. | Levy> BID 148  View
260  CVE-1999-0261  Candidate  Netmanager Chameleon SMTPd has several buffer overflows that cause a crash.  Modified (20000827-01)  ACCEPT(1) Baker | MODIFY(2) Frech, Landfield | NOOP(3) Christey, Northcutt, Ozancin  Frech> XF:chamelion-smtp-dos | Landfield> - Specify what "a crash" means. | Christey> ADDREF XF:chameleon-smtp-dos ? (but it"s not on the web site) | Christey> Consider adding BID:2387  View
772  CVE-1999-0792  Candidate  ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration.  Modified (20000827)  ACCEPT(1) Baker | MODIFY(2) Frech, Stracener | NOOP(1) Christey | REVIEWING(1) Levy  Stracener> Change the Ref to read: ROOTSHELL: Osicom Technologies ROUTERmate | Security | Advisory | Frech> XF:routermate-snmp-community | Christey> BUGTRAQ:19980914 [rootshell] Security Bulletin #23 | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90581019105693&w=2  View

Page 564 of 20943, showing 5 records out of 104715 total, starting on record 2816, ending on 2820

Actions