CVE-2004-0809
https://notcve.org/view.php?id=CVE-2004-0809
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access. • http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&r2=1.33 http://www.debian.org/security/2004/dsa-558 http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096 http://www.redhat.com/support/errata/RHSA-2004-463.html http://www.trustix.org/errata/2004/0047 https://exchange.xforce.ibmcloud.com/vulnerabilities/17366 https://lists.apache.org/thread.html/54a42d4b01968df11 •
CVE-2004-0801
https://notcve.org/view.php?id=CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.12/SCOSA-2005.12.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000880 http://lists.suse.com/archive/suse-security-announce/2006-May/0007.html http://secunia.com/advisories/12557 http://secunia.com/advisories/20312 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000757.1-1 http://www.mandrakesecure.net/en/advisories/advisory.php?name •
CVE-2004-0415 – Linux Kernel 2.4.26 - File Offset Pointer Handling Memory Disclosure
https://notcve.org/view.php?id=CVE-2004-0415
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory. • https://www.exploit-db.com/exploits/375 ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000879 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:087 http://www.redhat.com/support/errata/RHSA-2004-413.html http://www.redhat.com/support/errata/RHSA-2004-418.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16 •
CVE-2004-0600 – Samba 3.0.4 - SWAT Authorisation Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0600
Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication. Desbordamiento de búfer en la Herramienta de Adminstración Web de Samba (SWAT) en Samba 3.0.2 a 3.0.4 permite a atacantes remotos ejecutar código de su elección mediante un carácter en base-64 inválido durante autenticación básica HTTP. • https://www.exploit-db.com/exploits/364 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000851 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000854 http://marc.info/?l=bugtraq&m=109051340810458&w=2 http://marc.info/?l=bugtraq&m=109051533021376&w=2 http://marc.info/? •
CVE-2004-0686
https://notcve.org/view.php?id=CVE-2004-0686
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors. Desbordamiento de búfer en Samba 2.2.x a 2.2.9 y 3.0.0 a 3.0.4, cuando la opción "mangling method = hash" está establecida en smb.conf, con impacto y vectores de ataque desconocidos. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000851 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000854 http://marc.info/?l=bugtraq&m=109051340810458&w=2 http://marc.info/?l=bugtraq&m=109051533021376&w=2 http://marc.info/? •