CVE-1999-1419
https://notcve.org/view.php?id=CVE-1999-1419
Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/148 http://www.iss.net/security_center/static/7535.php http://www.securityfocus.com/bid/219 •
CVE-1999-1423 – Solaris 2.5.1 - 'Ping' System Panic (Denial of Service)
https://notcve.org/view.php?id=CVE-1999-1423
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i. • https://www.exploit-db.com/exploits/19161 http://marc.info/?l=bugtraq&m=87602558319160&w=2 http://marc.info/?l=bugtraq&m=87602558319171&w=2 http://marc.info/?l=bugtraq&m=87602558319180&w=2 http://marc.info/?l=bugtraq&m=87602558319181&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl? •
CVE-1999-0189
https://notcve.org/view.php?id=CVE-1999-0189
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/142 •
CVE-1999-1191 – Solaris 2.5.0/2.5.1 ps / chkey - Data Buffer
https://notcve.org/view.php?id=CVE-1999-1191
Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. • https://www.exploit-db.com/exploits/332 https://www.exploit-db.com/exploits/19160 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.18.solaris.chkey.buffer.overflow.vul http://marc.info/?l=bugtraq&m=87602167418335&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/144 http://www.iss.net/security_center/static/7442.php http://www.securityfocus.com/bid/207 •
CVE-1999-1402 – FreeBSD 3.1 / Solaris 2.6 - Domain Socket
https://notcve.org/view.php?id=CVE-1999-1402
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •