CVE-1999-0297
https://notcve.org/view.php?id=CVE-1999-0297
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0297 •
CVE-1999-0032 – BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. • https://www.exploit-db.com/exploits/19545 https://www.exploit-db.com/exploits/19544 ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX http://www.ciac.org/ciac/bulletins/i-042.shtml http://www.securityfocus.com/bid/707 •
CVE-1999-1187
https://notcve.org/view.php?id=CVE-1999-1187
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. • http://marc.info/?l=bugtraq&m=87602167419803&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/416 •
CVE-1999-0023 – BSDI BSD/OS 2.1 / FreeBSD 2.1 / IBM AIX 4.2 / SGI IRIX 6.4 / Sun SunOS 4.1.3 - Buffer Overrun
https://notcve.org/view.php?id=CVE-1999-0023
Local user gains root privileges via buffer overflow in rdist, via lookup() function. • https://www.exploit-db.com/exploits/19106 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023 •
CVE-1999-1572
https://notcve.org/view.php?id=CVE-1999-1572
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. • http://marc.info/?l=bugtraq&m=110763404701519&w=2 http://secunia.com/advisories/14357 http://secunia.com/advisories/17063 http://secunia.com/advisories/17532 http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf http://www.debian.org/security/2005/dsa-664 http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391 http://www.mandriva.com/security/advisories?name=MDKSA-2005:032 http://www.redhat.com/support/errata/RHSA-2005-073.html http://www.redhat.com/support •