
CVE-1999-0032 – BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0032
25 Oct 1996 — Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. • https://www.exploit-db.com/exploits/19545 •

CVE-1999-0131
https://notcve.org/view.php?id=CVE-1999-0131
11 Sep 1996 — Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVE-1999-1187
https://notcve.org/view.php?id=CVE-1999-1187
26 Aug 1996 — Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. • http://marc.info/?l=bugtraq&m=87602167419803&w=2 •

CVE-1999-0085
https://notcve.org/view.php?id=CVE-1999-0085
21 Aug 1996 — Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname. • https://exchange.xforce.ibmcloud.com/vulnerabilities/118 •

CVE-1999-0023 – BSDI BSD/OS 2.1 / FreeBSD 2.1 / IBM AIX 4.2 / SGI IRIX 6.4 / Sun SunOS 4.1.3 - Buffer Overrun
https://notcve.org/view.php?id=CVE-1999-0023
24 Jul 1996 — Local user gains root privileges via buffer overflow in rdist, via lookup() function. • https://www.exploit-db.com/exploits/19106 •

CVE-1999-1301
https://notcve.org/view.php?id=CVE-1999-1301
16 Jul 1996 — A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:17.rzsz.asc •

CVE-1999-1572
https://notcve.org/view.php?id=CVE-1999-1572
16 Jul 1996 — cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. • http://marc.info/?l=bugtraq&m=110763404701519&w=2 •

CVE-1999-0022
https://notcve.org/view.php?id=CVE-1999-0022
03 Jul 1996 — Local user gains root privileges via buffer overflow in rdist, via expstr() function. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179 • CWE-125: Out-of-bounds Read •

CVE-1999-0138
https://notcve.org/view.php?id=CVE-1999-0138
26 Jun 1996 — The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138 •

CVE-1999-1313
https://notcve.org/view.php?id=CVE-1999-1313
23 May 1996 — Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc •