CVE List

Id CVE No. Status Description Phase Votes Comments Actions
451  CVE-1999-0452  Candidate  A service or application has a backdoor password that was placed there by the developer.  Proposed (19990726)  ACCEPT(2) Baker, Wall | REJECT(1) Frech  Frech> Much too broad. Also may be HIGHCARD (or will be in the future). | Baker> I think we want to address this using the dot notation idea. We do need to address this, just not a separate entry for every single occurance.  View
452  CVE-1999-0453  Candidate  An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).  Modified (20040512-02)  ACCEPT(2) Baker, Balinsky | MODIFY(1) Frech | NOOP(2) Northcutt, Wall | REVIEWING(1) Christey  Frech> XF:cisco-ident(2289) | ADDREF BUGTRAQ:19990118 Remote Cisco Identification | In description, probably better to use "Cisco" as product/company name. | Balinsky> CiscoSecure IDS has a signature for this...ID 3602 Cisco IOS Identity. | Christey> There may be a slight abstraction problem here, e.g. look | at the candidate for queso/nmap; also see followup Bugtraq post | from "Basement Research" on 19990120 which says that there are | many other features in Cisco products that allow remote | identification. | Christey> fix typo: "Dicsovery"  View
453  CVE-1999-0454  Candidate  A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.  Proposed (19990728)  MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(2) Baker, Northcutt  Northcutt> Nmap and queso are the tip of the iceberg and not the most advanced | ways to accomplish this. To pursue making the world signature free | is as much a vulnerability as having signatures, nay more. | Frech> XF:decod-nmap(2053) | XF:decod-queso(2048) | Christey> Add "fingerprinting" to facilitate search. | Some references: | MISC:http://www.insecure.org/nmap/nmap-fingerprinting-article.html | BUGTRAQ:19981228 A few more fingerprinting techniques - time and netmask | http://marc.theaimsgroup.com/?l=bugtraq&m=91489155019895&w=2 | BUGTRAQ:19990222 Preventing remote OS detection | http://marc.theaimsgroup.com/?l=bugtraq&m=91971553006937&w=2 | BUGTRAQ:20000901 ICMP Usage In Scanning v2.0 - Research Paper | http://marc.theaimsgroup.com/?l=bugtraq&m=96791499611849&w=2 | BUGTRAQ:20000912 Using the Unused (Identifying OpenBSD, | http://marc.theaimsgroup.com/?l=bugtraq&m=96879267724690&w=2 | BUGTRAQ:20000912 The DF Bit Playground (Identifying Sun Solaris & OpenBSD OSs) | http://marc.theaimsgroup.com/?l=bugtraq&m=96879481129637&w=2 | BUGTRAQ:20000816 TOSing OSs out of the window / Fingerprinting Windows 2000 with | http://marc.theaimsgroup.com/?l=bugtraq&m=96644121403569&w=2 | BUGTRAQ:20000609 p0f - passive os fingerprinting tool | http://marc.theaimsgroup.com/?l=bugtraq&m=96062535628242&w=2 | Baker> I think we can probably reject this as the corollary is that you can identify OS from a IP/TCP packet sent by a system, looking at various parts of the SYN packet. Unless we believe that all systems should always use identical packet header/identical responses, in which case the protocol should not permit variation.  View
454  CVE-1999-0455  Candidate  The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.  Modified (19991210-01)  ACCEPT(3) Balinsky, Frech, Ozancin | MODIFY(1) Wall | NOOP(1) Baker | REVIEWING(1) Christey  Wall> The reference should be ASB99-01 (Expression Evaluator Security Issues) | make application plural since there are three sample applications | (openfile.cfm, displayopenedfile.cfm, and exprcalc.cfm). | Christey> The CD:SF-EXEC and CD:SF-LOC content decisions apply here. | Since there are 3 separate "executables" with the same | (or similar) problem, we need to make sure that CD:SF-EXEC | determines what to do here. There is evidence that some | of these .cfm scripts have an "include" file, and if so, | then CD:SF-LOC says that we shouldn"t make separate entries | for each of these scripts. On the other hand, the initial | L0pht discovery didn"t include all 3 of these scripts, and | as far as I can tell, Allaire had patched the first problem | before the others were discovered. So, CD:DISCOVERY-DATE | may argue that we should split these because the problems | were discovered and patched at different times. | | In any case, this candidate can not be accepted until the | Editorial Board has accepted the CD:SF-EXEC, CD:SF-LOC, | and CD:DISCOVERY-DATE content decisions.  View
455  CVE-1999-0457  Entry  Linux ftpwatch program allows local users to gain root privileges.        View

Page 91 of 20943, showing 5 records out of 104715 total, starting on record 451, ending on 455

Actions