CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1285 | CVE-1999-1305 | Candidate | Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | Frech> XF:sco-at(7589) | View |
3251 | CVE-2001-0433 | Candidate | Buffer overflow in Savant 3.0 web server allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Host HTTP header. | Proposed (20010524) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(1) Christey | Frech> XF:savant-get-bo(4901) | Christey> Should CVE-2002-0099 and/or CVE-2001-0433 be MERGED with | CVE-2000-0641? All describe slightly different overflows | that, perhaps, should be merged according to CD:SF-LOC. | It depends on which versions are affected, which would require | some vendor acknowledgement or consultation. | | A vague changelog for version 3.1 at | http://sourceforge.net/project/shownotes.php?release_id=75333 says | "security fixes" but it"s not clear *which* security fixes | were made. | | The description for CVE-2000-0641 is slightly incorrect. The | exploit is clearly due to a large number of headers, not | arguments to the GET request itself. So, CVE-2000-0641 | clearly overlaps with CVE-2001-0433. | | The exploit for CVE-2001-0433 also doesn"t really have | anything to do with a "cgi-test.pl" program (which isn"t in | the distribution). The discloser simply used that as an | example program of a long request. | View |
2086 | CVE-2000-0509 | Candidate | Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname. | Proposed (20000712) | ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall | Frech> XF:sambar-dll-bo(4592) | View |
3224 | CVE-2001-0406 | Candidate | Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. | Modified (20050509) | ACCEPT(5) Baker, Cole, Prosser, Williams, Ziese | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:samba-tmpfile-symlink(6396) | Christey> note to self: double-check related submissions to ensure that | all references are complete | Christey> ADDREF RHSA-2001:044 (per Mark Cox of Red Hat) | Christey> Add "2.0.8 and earlier" to description; problem was fixed in | 2 different versions, and initial 2.0.8 fixes were incorrect. | BUGTRAQ:20010508 Samba 2.0.9 released - 2.0.8 did NOT fix the hole | URL:http://archives.neohapsis.com/archives/bugtraq/2001-05/0061.html | IMMUNIX:IMNX-2001-70-019-01 | BUGTRAQ:20010525 TSLSA-2001-0006: Samba | URL:http://archives.neohapsis.com/archives/bugtraq/2001-05/0242.html | CALDERA:CSSA-2001-018.0 | URL:http://www.calderasystems.com/support/security/advisories/CSSA-2001-018.0.txt | View |
1166 | CVE-1999-1186 | Candidate | rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. | Proposed (20010912) | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:rxvtpipe(425) | View |
Page 94 of 20943, showing 5 records out of 104715 total, starting on record 466, ending on 470