CVE List

Id CVE No. Status Description Phase Votes Comments Actions
6877  CVE-2003-0048  Candidate  PuTTY 0.53b and earlier does not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials.  Modified (20071220)  ACCEPT(3) Baker, Green, Stracener | NOOP(3) Cole, Cox, Wall  Green> VENDOR ACKNOWLEDGED FIX IN CHANGE LOG OF 2002-11-12  View
254  CVE-1999-0255  Candidate  Buffer overflow in ircd allows arbitrary command execution.  Proposed (19990623)  ACCEPT(3) Baker, Hill, Northcutt | MODIFY(1) Frech | NOOP(1) Prosser | REJECT(1) Christey  Frech> XF:irc-bo | Christey> This is too general and doesn"t have any references. The | XF reference doesn"t appear toe xist any more. | | Perhaps this reference would help: | BUGTRAQ:19970701 ircd buffer overflow | Baker> It appears that the XForce entry has been corrected, and there is a patch posted in the original bugtraq post.  View
645  CVE-1999-0663  Candidate  A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.  Proposed (19990804)  ACCEPT(3) Baker, Hill, Wall | RECAST(1) Northcutt  Northcutt> This needs to be worded carefully. | 1. Rootkits evade checksum detection. | 2. The modification could be positive (a patch)  View
1613  CVE-2000-0035  Candidate  resend command in Majordomo allows local users to gain privileges via shell metacharacters.  Proposed (20000111)  ACCEPT(3) Baker, Levy, Stracener | MODIFY(2) Cox, Frech | NOOP(1) Armstrong | REVIEWING(1) Christey  Frech> XF:majordomo-local-resend | Christey> The Bugtraq thread indicates that this problem may be | due to misconfiguration, and may extend beyond just the | resend command. | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] | Christey> Include "wrapper" to facilitate search and matching? (but | double-check CVE-2000-0037). | Add "1.94.4 and earlier" as the affected version number. | ADDREF AUSCERT:AA-2000.01 | ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.01 | Cox> ADDREF REDHAT:RHSA-2000:005  View
2291  CVE-2000-0715  Candidate  DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.  Modified (20080226)  ACCEPT(3) Baker, Levy, Williams | MODIFY(2) Christey, Cox | NOOP(2) Cole, Wall  Christey> XF:diskcheck-tmp-race-condition | http://xforce.iss.net/static/5061.php | Christey> ADDREF REDHAT:RHSA-2000:122-04 ? | The advisory addresses some diskcheck symlink vulnerability, | but the initial announcement was 4 months before the advisory | was released; however, the DiskCheck versions seem to | correspond. | Christey> See various Bugtraq posts relating to this, and verify if the | Conectiva/Red Hat/etc. advisories are really addressing this | particular problem. | e.g.: BUGTRAQ:20000622 Re: rh 6.2 - gid compromises, etc [+ MORE!!!] | http://marc.theaimsgroup.com/?l=bugtraq&m=96172022819526&w=2 | BUGTRAQ:20000810 CONECTIVA LINUX SECURITY ANNOUNCEMENT - diskcheck | http://marc.theaimsgroup.com/?l=bugtraq&m=96604843017702&w=2 | REDHAT:RHSA-2000:122-06 | http://marc.theaimsgroup.com/?l=bugtraq&m=97649229201967&w=2 | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | Christey> The following RedHat advisory appears to identify the same | problem as one that was posted to Bugtraq on August 8, 2000: | REDHAT:RHSA-2000:122-06 | http://www.redhat.com/support/errata/powertools/RHSA-2000-122.html | | See the following BugID, as referenced in the advisory: | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=11724 | So, add: | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | XF:linux-diskcheck-race-symlink | URL:http://xforce.iss.net/static/5624.php | | [note the apparent BID duplicates, however] | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> Missing BID - BID:1552 | Cox> ADDREF REDHAT:RHSA-2000:122  View

Page 951 of 20943, showing 5 records out of 104715 total, starting on record 4751, ending on 4755

Actions