CVE-1999-0691 – DIGITAL UNIX 4.0 d/e/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.securityfocus.com/bid/635 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078 •
CVE-1999-0687
https://notcve.org/view.php?id=CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •
CVE-1999-0674 – NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil' Modify The Internal Data Space
https://notcve.org/view.php?id=CVE-1999-0674
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •
CVE-2000-0118 – RedHat Linux 5.2 i386/6.0 - No Logging
https://notcve.org/view.php?id=CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 http://marc.info/?l=bugtraq&m=94935300520617&w=2 •
CVE-1999-0493 – Sun Solaris 2.5.1 - rpc.statd rpc Call Relaying
https://notcve.org/view.php?id=CVE-1999-0493
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 http://marc.info/?l=bugtraq&m=91547759121289&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba http://www.cert.org/advisories/CA-99-05-statd-automountd.html http://www.ciac.org/ciac/bulletins/j-045.shtml http://www.securityfocus.com/bid/450 •