
CVE-2004-1701 – GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun
https://notcve.org/view.php?id=CVE-2004-1701
09 Aug 2004 — Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication. • https://www.exploit-db.com/exploits/24360 •

CVE-2004-1702
https://notcve.org/view.php?id=CVE-2004-1702
09 Aug 2004 — The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash). • http://marc.info/?l=bugtraq&m=109208394910086&w=2 •

CVE-2004-0603
https://notcve.org/view.php?id=CVE-2004-0603
30 Jun 2004 — gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332. gzexe en gzip 1.3.3 y anteriores ejecutaran un argumento cuando la creación de un fichero temporal falla, en lugar de terminar el programa, lo que podría permitir a atacantes remotos o usuarios locales ejecutar órdenes de su elección, una vulnerabilidad dif... • http://bugs.gentoo.org/show_bug.cgi?id=54890 •

CVE-2004-0623
https://notcve.org/view.php?id=CVE-2004-0623
30 Jun 2004 — Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog. Vulnerabilidad de cadena de formato en misc.c en GNU GNATS 4.00 puede permitir a atacantes remotos ejecuta código arbitrario mediante especificadores de cadena de formato en una cadena que sea registrada por syslog • http://marc.info/?l=bugtraq&m=108820000823191&w=2 •

CVE-2004-0576
https://notcve.org/view.php?id=CVE-2004-0576
30 Jun 2004 — The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID. El demonio radius (radiusd) de GNU Radius 1.1, cuando se compila con la opción -enable-snmp, permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante un mensaje SNMP malformado conteniendo un OID no válido. • http://marc.info/?l=full-disclosure&m=108785242716726&w=2 •

CVE-2004-0581
https://notcve.org/view.php?id=CVE-2004-0581
23 Jun 2004 — ksymoops-gznm script in Mandrake Linux 9.1 through 10.0, and Corporate Server 2.1, allows local users to delete arbitrary files via a symlink attack on files in /tmp. El script ksymoops-gznm en Mandrake Linux 9.1 a 10.0, y Corporate Server 2.1 permite a usuarios locales borrar ficheros arbitrarios mediante un ataque de enlaces simbólicos en /tmp. • http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:060 •

CVE-2004-0548 – Aspell (word-list-compress) - Command Line Stack Overflow
https://notcve.org/view.php?id=CVE-2004-0548
11 Jun 2004 — Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option. Desbordamiento de búfer basado en la pila en la funcionalidad word-list-compress en compress.c de Aspell permite a usuarios locales ejecutar código arbitrario mediante una entrada larga en la lista de palabras que no se maneja adecuad... • https://www.exploit-db.com/exploits/669 •

CVE-2004-0412
https://notcve.org/view.php?id=CVE-2004-0412
03 Jun 2004 — Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server. Mailman anteriores a 2.1.5 permiten a atacantes remotos obtener contraseñas de usuario mediante peticiones de correo electronico especialmente elaboradas. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842 •

CVE-2004-0422
https://notcve.org/view.php?id=CVE-2004-0422
06 May 2004 — flim before 1.14.3 creates temporary files insecurely, which allows local users to overwrite arbitrary files of the Emacs user via a symlink attack. flim anteriores a 1.14.3 crea ficheros temporales de manera insegura, lo que permite a usuarios locales sobreescribir ficheros de su elección del usuario Emacs mediante un ataque de enlaces simbólicos. • http://www.debian.org/security/2004/dsa-500 •

CVE-2004-0182
https://notcve.org/view.php?id=CVE-2004-0182
17 Apr 2004 — Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field. • ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc •