CVE List

Id CVE No. Status Description Phase Votes Comments Actions
2086  CVE-2000-0509  Candidate  Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname.  Proposed (20000712)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall  Frech> XF:sambar-dll-bo(4592)  View
2136  CVE-2000-0559  Candidate  eTrust Intrusion Detection System (formerly SessionWall-3) uses weak encryption (XOR) to store administrative passwords in the registry, which allows local users to easily decrypt the passwords.  Proposed (20000712)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall  Frech> XF:etrust-weak-password-encryption(5051)  View
2112  CVE-2000-0535  Candidate  OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken.  Proposed (20000712)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall | REVIEWING(1) Christey  Christey> ADDREF NETBSD | http://archives.neohapsis.com/archives/bugtraq/2000-06/0208.html | | Frech> XF:freebsd-alpha-weak-encryption(4704) | Christey> ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-007.txt.asc | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Should the NetBSD problem really be combined with this?  View
2122  CVE-2000-0545  Candidate  Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter.  Proposed (20000712)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall | REVIEWING(1) Christey  Frech> XF:sgi-mailx-bo(1371) | CVE-2000-0545 seems to be a dupe of CVE-1999-0125 (Buffer overflow in SGI | IRIX mailx program) since they both allow "mail" group privileges. There was | no exploit for SGI"s vuln to compare. | Christey> Since we are taking a split-by-default approach when | there are insufficient details, we should keep this | separate from CVE-1999-0125. The difference in the | time of discovery is also a factor, even if these wind | up being the same problem. However, there just aren"t | enough details to be sure if this is the same problem or not. | Christey> On June 25, 1998, a buffer overflow in mailx via the HOME | environmental variable was posted at: | BUGTRAQ:19980625 security hole in mailx | http://marc.theaimsgroup.com/?l=bugtraq&m=90221103125955&w=2 | | This affected multiple OSes. | | SGI:19980605-01-PX (CVE-1999-0125) was published on September | 29, 1998; while the advisory is short on details, it does | mention a buffer overflow. | | So, there"s enough distinction here (time and what gets | exploited) to say that these should remain split; but | CVE-1999-0125 likely needs to be RECAST to mention other | affected OSes.  View
1776  CVE-2000-0198  Candidate  Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service.  Proposed (20000322)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(5) Baker, Blake, Cole, LeBlanc, Wall  Frech> XF:mercur-login-dos | The following don"t seem to be correct: | Reference: | URL:http://archives.neohapsis.com/archives/ntbugtraq/current/0206.html | Perhaps it is: | http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0206.html | Reference: | URL:http://archives.neohapsis.com/archives/bugtraq/current/0137.html | Perhaps it is: | http://archives.neohapsis.com/archives/bugtraq/2000-03/0137.html  View

Page 886 of 20943, showing 5 records out of 104715 total, starting on record 4426, ending on 4430

Actions