CVE-2003-0064
https://notcve.org/view.php?id=CVE-2003-0064
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •
CVE-2002-1690
https://notcve.org/view.php?id=CVE-2002-1690
Unknown vulnerability in AIX before 4.0 with unknown attack vectors and unknown impact, aka "security issue," as fixed by APAR IY28225. • http://archives.neohapsis.com/archives/aix/2002-q1/0005.html •
CVE-2002-1622
https://notcve.org/view.php?id=CVE-2002-1622
Buffer overflow in certain RPC routines in IBM AIX 4.3 may allow attackers to execute arbitrary code, related to a "variable data type." • http://www-1.ibm.com/support/search.wss?rs=0&q=IY28706&apar=only http://www.kb.cert.org/vuls/id/273779 https://exchange.xforce.ibmcloud.com/vulnerabilities/10112 •
CVE-2002-1689
https://notcve.org/view.php?id=CVE-2002-1689
Unknown vulnerability in the login program on AIX before 4.0 could allow remote users to specify 100 or more environment variables when logging on, which exceeds the length of a certain string, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/aix/2002-q1/0005.html •
CVE-2002-1201
https://notcve.org/view.php?id=CVE-2002-1201
IBM AIX 4.3.3 and AIX 5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a flood of malformed TCP packets without any flags set, which prevents AIX from releasing the associated memory buffers. IBM AIX 4.3.3 y AIX 5 permite a atacantes remotos causar una denegación de servicio (consumición de CPU o caída) mediante una inundación de paquetes TCP malformados sin ningún flag establecido, lo que impide que AIX libere los búferes de memoria asociados. • http://marc.info/?l=bugtraq&m=103418410408599&w=2 http://www-1.ibm.com/support/docview.wss?rs=0&q=IY31641&uid=isg1IY31641&loc=en_US&cs=utf-8&cc=us&lang=en http://www.iss.net/security_center/static/10326.php http://www.kb.cert.org/vuls/id/102345 http://www.securityfocus.com/bid/5925 •