
CVE-2003-0804
https://notcve.org/view.php?id=CVE-2003-0804
25 Sep 2003 — The arplookup function in FreeBSD 5.1 and earlier, Mac OS X before 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP requests. La función asplookup en FreeBSD 5.1 y anteriores, Max OS X anteriores a 10.2.8, y posiblemente otros sistemas basados en BSD, permite a atacantes remotos en una subred local causar una denegación de servicio (agotamiento de recursos y pánico) mediante una inu... • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:14.arp.asc •

CVE-2003-0787
https://notcve.org/view.php?id=CVE-2003-0787
25 Sep 2003 — The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges. La función de conversación PAM en OpenSSH 3.7.1 y 3.7.1p1 interpreta un array de estructuras como un array de punteros, lo que permite a atacantes modificar la pila y posiblemente ganar privilegios. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html •

CVE-2003-0682
https://notcve.org/view.php?id=CVE-2003-0682
18 Sep 2003 — "Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. "Errores de Memoria" en OpenSSH 3.7.1 y anteriores, con impacto desconocido, un grupo de vulnerabilidades distinto de CAN-2003-0693 y CAN-2003-0695. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •

CVE-2003-0681 – Sendmail 8.12.9 - 'Prescan()' Variant Remote Buffer Overrun
https://notcve.org/view.php?id=CVE-2003-0681
18 Sep 2003 — A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. Un "desbordamiento de búfer potencial en el análisis de reglas" (ruleset parsing) en Sendmail 8.12.9 cuando se usan los conjuntos de reglas no estándar: (1) receptor, (2) final, o (3) receptores de envoltorio específicos del enviador de correo, tienen consecuencias desconocidas. • https://www.exploit-db.com/exploits/23154 •

CVE-2003-0695
https://notcve.org/view.php?id=CVE-2003-0695
18 Sep 2003 — Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. Múltiples "errores de gestión de búferes" en OpenSSH anteriores a 3.7.1 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario usando (1) buffer_init en buffer.c, (2) buffer_free en buffer.... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •

CVE-2003-0693
https://notcve.org/view.php?id=CVE-2003-0693
17 Sep 2003 — A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html •

CVE-2003-0688
https://notcve.org/view.php?id=CVE-2003-0688
03 Sep 2003 — The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P •

CVE-2003-0466 – FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0466
01 Aug 2003 — Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO. Error de fuera-por-uno (off-by-one) en la función fb_realpath(), derivada de la función realpath de BSD, pude permitir a atacantes ejecutar código... • https://www.exploit-db.com/exploits/22976 • CWE-193: Off-by-one Error •

CVE-2003-0386
https://notcve.org/view.php?id=CVE-2003-0386
10 Jun 2003 — OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address. OpenSSH 3.6.1 y anteriores, cuando se restringe el acceso de máquinas por direcciones IP numéricas, y con VerifyReverseMapping desactivado, permite a atacantes remotos evitar restricciones de acceso "from=" y "usuar... • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc •

CVE-2003-0190 – OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident
https://notcve.org/view.php?id=CVE-2003-0190
02 May 2003 — OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. OpenSSH-portable (OpenSSH) 3.6.1p1 y anteriores con soporte PAM activado envía inmediatamente un mensaje de error cuando un usuario no existe, lo que permite a atacantes remotos determinar nombres de usuario válidos mediante un ataque de temporización. • https://packetstorm.news/files/id/181223 • CWE-203: Observable Discrepancy •