CVE-2002-1337 – Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2002-1337
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. Desbordamiento de búfer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecución arbitraria de código mediante ciertos campos de dirección formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la función crackaddr del fichero headers.c. • https://www.exploit-db.com/exploits/411 https://www.exploit-db.com/exploits/22313 https://www.exploit-db.com/exploits/22314 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6 ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5 ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571 http://frontal2. • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2003-0064
https://notcve.org/view.php?id=CVE-2003-0064
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •
CVE-2003-1078
https://notcve.org/view.php?id=CVE-2003-1078
The FTP client for Solaris 2.6, 7, and 8 with the debug (-d) flag enabled displays the user password on the screen during login. • http://secunia.com/advisories/8186 http://sunsolve.sun.com/search/document.do?assetkey=1-26-51081-1 http://www.securityfocus.com/bid/6989 http://www.securitytracker.com/id?1006195 https://exchange.xforce.ibmcloud.com/vulnerabilities/11436 •
CVE-2003-0058
https://notcve.org/view.php?id=CVE-2003-0058
MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allows remote authenticated attackers to cause a denial of service (crash) on KDCs within the same realm via a certain protocol request that causes a null dereference. MIT Kerberos V5 Key Distribution Center (KDC) anteriores a 1.2.5 permite a atacantes autenticados remotamente causar una denegación de servicio (caída) en KDCs en el mismo dominio mediante una cierta petición de protocolo que causa una desreferencia nula. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50142 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt http://www.kb.cert.org/vuls/id/661243 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:043 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-168 •
CVE-2003-1079
https://notcve.org/view.php?id=CVE-2003-1079
Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1 http://www.securityfocus.com/bid/6883 http://www.securitytracker.com/id?1006131 https://exchange.xforce.ibmcloud.com/vulnerabilities/11368 •