CVE List

Id CVE No. Status Description Phase Votes Comments Actions
8992  CVE-2004-0564  Candidate  Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer"s warnings.  Assigned (20040614)  NOOP(1) Christey  Christey> In addition to the public statement made to Bugtraq, David | F. Skoll, the developer of pppoe, says: | >CVE-2004-0564 is a | >bogus "vulnerability". rp-pppoe is NOT meant to be installed | >setuid-root. One might as well file a "vulnerability" on "cat" | >because if "cat" is setuid-root, then an "attacker" can read any file | >on the system. | > | >This vulnerability is more properly a Debian vulnerability because | >Debian ... insecurely installs rp-pppoe suid-root. | > | >Please add my comments to the "Comments" field of the CVE; I don"t think | >it should be blessed with an official listing.  View
8993  CVE-2004-0565  Candidate  Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.  Assigned (20040615)  None (candidate not yet proposed)    View
8994  CVE-2004-0566  Candidate  Integer overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.  Assigned (20040615)  None (candidate not yet proposed)    View
8995  CVE-2004-0567  Candidate  The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."  Assigned (20040615)  None (candidate not yet proposed)    View
8996  CVE-2004-0568  Candidate  HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.  Assigned (20040615)  None (candidate not yet proposed)    View

Page 887 of 20943, showing 5 records out of 104715 total, starting on record 4431, ending on 4435

Actions