CVE-1999-0687
https://notcve.org/view.php?id=CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •
CVE-1999-0676
https://notcve.org/view.php?id=CVE-1999-0676
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. • http://www.securityfocus.com/bid/575 http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org •
CVE-1999-0674 – NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil' Modify The Internal Data Space
https://notcve.org/view.php?id=CVE-1999-0674
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •
CVE-1999-0696 – Caldera OpenUnix 8.0/UnixWare 7.1.1 / HP HP-UX 11.0 / Solaris 7.0 / SunOS 4.1.4 - rpc.cmsd Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0696
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 https://www.exploit-db.com/exploits/19421 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 http://www.ciac.org/ciac/bulletins/j-051.shtml http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 •
CVE-1999-0493 – Sun Solaris 2.5.1 - rpc.statd rpc Call Relaying
https://notcve.org/view.php?id=CVE-1999-0493
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 http://marc.info/?l=bugtraq&m=91547759121289&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba http://www.cert.org/advisories/CA-99-05-statd-automountd.html http://www.ciac.org/ciac/bulletins/j-045.shtml http://www.securityfocus.com/bid/450 •