CVE-2002-0294
https://notcve.org/view.php?id=CVE-2002-0294
Alcatel 4400 installs the /chetc/shutdown command with setgid privileges, which allows many different local users to shut down the system. Alcatel 4400 instala el comando /chetc/shutdown con privilegios setgid, lo que permite a muchos usuarios locales apagar el sistema. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 http://www.securityfocus.com/bid/4130 •
CVE-2002-0295
https://notcve.org/view.php?id=CVE-2002-0295
Alcatel OmniPCX 4400 installs files with world-writable permissions, which allows local users to reconfigure the system and possibly gain privileges. Alcatel OmniPCX 4400 instala ficheros con permisos de escritura para todos los usuarios, lo que permite a usuarios locales reconfigurar el sistema y posiblemente ganar privilegios. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 http://www.securityfocus.com/bid/4133 •
CVE-2002-0293
https://notcve.org/view.php?id=CVE-2002-0293
FTP service in Alcatel OmniPCX 4400 allows the "halt" user to gain root privileges by modifying root's .profile file. El servicio FTP en Alcatel OmniPCX 4400 permite al usuario "halt" ganar privilegios de root modificando el fichero de root .profile. • http://marc.info/?l=bugtraq&m=101413767925869&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/8225 •
CVE-2002-0119
https://notcve.org/view.php?id=CVE-2002-0119
Alcatel Speed Touch Home ADSL Modem allows remote attackers to cause a denial of service (reboot) via a network scan with unusual packets, such as nmap with OS detection. el modem de Alcatel Speed Touch Home ADSL permite e atacantes remotos causar una negación de servicio (reboot) via a scaneo de la red con paquetes anormales, como nmap con detección de OS • http://online.securityfocus.com/archive/1/249746 http://www.iss.net/security_center/static/7893.php http://www.securityfocus.com/bid/3851 •
CVE-2001-1484
https://notcve.org/view.php?id=CVE-2001-1484
Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication. • http://www.cert.org/advisories/CA-2001-08.html http://www.kb.cert.org/vuls/id/211736 https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 •