CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1696 | CVE-2000-0118 | Candidate | The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. | Proposed (20000208) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey | Frech> Is this the same issue as BugTraq Mailing List, Wed, 9 Jun 1999 14:07:27 | -0700 "vulnerability in su/PAM in redhat" at | http://www.netspace.org/cgi-bin/wa?A2=ind9906b&L=bugtraq&F=&S=&P=5356 and | "Solaris 2.5 /bin/su [was: vulnerability in su/PAM in redhat]" at | http://www.netspace.org/cgi-bin/wa?A2=ind9906b&L=bugtraq&F=&S=&P=6051 | If so, then MODIFY XF:su-brute | Christey> BID:320 | URL:http://www.securityfocus.com/vdb/bottom.html?vid=320 | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:su-brute(2278) | This issue involves more platforms than Red Hat. See BugTraq | Mailing List, Thu Jun 10 1999 12:13:06, "Solaris 2.5 /bin/su [was: | vulnerability in su/PAM in redhat]", | http://www.securityfocus.com/archive/1/14854 | Christey> It does look like this is the same issue as the other Bugtraq | post that explicitly mentions Red Hat and PAM. | CHANGE> [Christey changed vote from NOOP to REVIEWING] | View |
1775 | CVE-2000-0197 | Candidate | The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. | Proposed (20000322) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Blake, Ozancin | REJECT(1) LeBlanc | REVIEWING(1) Wall | LeBlanc> this is just bad security practice, not a vulnerability | Frech> XF:nt-at-drive-mappings | View |
2360 | CVE-2000-0784 | Candidate | sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh. | Proposed (20000921) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> XF:rapidstream-remote-execution | http://xforce.iss.net/static/5093.php | Frech> XF:rapidstream-remote-execution(5093) | View |
2367 | CVE-2000-0791 | Candidate | Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse. | Proposed (20000921) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> XF:trustix-secure-apache-misconfig | http://xforce.iss.net/static/5099.php | Frech> XF:trustix-secure-apache-misconfig(5099) | View |
1862 | CVE-2000-0284 | Candidate | Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. | Proposed (20000426) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> ADDREF FREEBSD:FreeBSD-SA-00:14 | URL:http://www.securityfocus.com/templates/advisory.html?id=2179 | Frech> XF:imap-mailserver-bo | View |
Page 937 of 20943, showing 5 records out of 104715 total, starting on record 4681, ending on 4685