Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator Canary security mechanisms by using a non-linear attack which directly modifies a pointer to a return address instead of using a buffer overflow to reach the return address entry itself.
BID:786 | URL:http://www.securityfocus.com/bid/786 | BUGTRAQ:19911109 ImmuniX OS Security Alert: StackGuard 1.21 Released | URL:http://marc.info/?l=bugtraq&m=94218618329838&w=2 | XF:immunix-stackguard-bo(3524) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/3524
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
BID:225 | URL:http://www.securityfocus.com/bid/225 | NTBUGTRAQ:19990206 New Windows 9x Bug: TCP Chorusing | URL:http://marc.info/?l=ntbugtraq&m=91849617221319&w=2 | XF:win-multiple-ip-dos(7542) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/7542
Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
Proposed (20010912)
BUGTRAQ:19970710 A New Fragmentation Attack | URL:http://www.securityfocus.com/archive/1/7219 | XF:nt-frag(528) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/528
Management information base (MIB) for a 3Com SuperStack II hub running software version 2.10 contains an object identifier (.1.3.6.1.4.1.43.10.4.2) that is accessible by a read-only community string, but lists the entire table of community strings, which could allow attackers to conduct unauthorized activities.
Proposed (20010912)
BUGTRAQ:19990830 One more 3Com SNMP vulnerability | URL:http://marc.info/?l=bugtraq&m=93616983223090&w=2
Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.
The Microsoft Windows network stack allows remote attackers to cause a denial of service (CPU consumption) via a flood of malformed ARP request packets with random source IP and MAC addresses, as demonstrated by ARPNuke.
The telnet server for 3Com hardware such as PS40 SuperStack II does not delay or disconnect remote attackers who provide an incorrect username or password, which makes it easier to break into the server via brute force password guessing.
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
Stack consumption vulnerability in Internet Explorer The JavaScript settimeout function in Internet Explorer allows remote attackers to cause a denial of service (crash) via the JavaScript settimeout function. NOTE: the vendor could not reproduce the problem.
Assigned (20050714)
BUGTRAQ:20011202 Stack overflow in all Internet Explorer Versions!! | URL:http://archives.neohapsis.com/archives/bugtraq/2001-12/0008.html | BUGTRAQ:20011204 RE: Stack overflow in all Internet Explorer Versions!! | URL:http://archives.neohapsis.com/archives/bugtraq/2001-12/0034.html | XF:ie-settimeout-dos(7661) | URL:http://www.iss.net/security_center/static/7661.php
PGP Security PGPfire 7.1 for Windows alters the system's TCP/IP stack and modifies packets in ICMP error messages in a way that allows remote attackers to determine that the system is running PGPfire.
Proposed (20020502)
BID:3961 | URL:http://www.securityfocus.com/bid/3961 | BUGTRAQ:20020125 Identifying PGP Corporate Desktop 7.1 with PGPfire Personal Desktop Firewall installed (no need to be enabled) on Microsoft Windows Based OSs | URL:http://online.securityfocus.com/archive/1/252407 | XF:pgpfire-icmp-fingerprint(8008) | URL:http://www.iss.net/security_center/static/8008.php
Web configuration utility in HP AdvanceStack hubs J3200A through J3210A with firmware version A.03.07 and earlier, allows unauthorized users to bypass authentication via a direct HTTP request to the web_access.html file, which allows the user to change the switch's configuration and modify the administrator password.
Vignette Story Server 4.1 and 6.0 allows remote attackers to obtain sensitive information via a request that contains a large number of '"' (double quote) and and '>' characters, which causes the TCL interpreter to crash and include stack data in the output.
Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory.
The HTTP administration interface for HP Procurve 4000M Switch firmware before C.09.16, with stacking features and remote administration enabled, does not authenticate requests to reset the device, which allows remote attackers to cause a denial of service via a direct request to the device_reset CGI program.
Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass.
Modified (20050610)
BID:6134 | URL:http://www.securityfocus.com/bid/6134 | BUGTRAQ:20021108 Technical information about unpatched MS Java vulnerabilities | URL:http://marc.info/?l=bugtraq&m=103682630823080&w=2 | NTBUGTRAQ:20021108 Technical information about unpatched MS Java vulnerabilities | URL:http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 | XF:msvm-class-loader-bo(10580) | URL:http://www.iss.net/security_center/static/10580.php
Unknown vulnerability related to stack corruption in the TGA daemon for HP-UX 11.04 (VVOS) Virtualvault 4.0, 4.5, and 4.6 may allow attackers to obtain access to system files.
Stack-based buffer overflow in SQLData Enterprise Server 3.0 allows remote attacker to execute arbitrary code and cause a denial of service via a long HTTP request.
mosix-protocol-stack in Multicomputer Operating System for UnIX (MOSIX) 1.5.7 allows remote attackers to cause a denial of service via malformed packets.
Assigned (20050714)
BID:4580 | URL:http://www.securityfocus.com/bid/4580 | BUGTRAQ:20020423 Denial of Service in Mosix 1.5.x | URL:http://archives.neohapsis.com/archives/bugtraq/2002-04/0327.html | XF:mosix-malformed-packet-dos(8927) | URL:http://www.iss.net/security_center/static/8927.php
Stack-based buffer overflow in the parse_field function in cgi_lib.c for LIBCGI 1.0.2 and 1.0.3 allows remote attackers to execute arbitrary code via a long argument.
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
The Linux 2.0 kernel IP stack does not properly calculate the size of an ICMP citation, which causes it to include portions of unauthorized memory in ICMP error responses.
Assigned (20030611)
BUGTRAQ:20030609 Linux 2.0 remote info leak from too big icmp citation | URL:http://marc.info/?l=bugtraq&m=105519179005065&w=2 | CERT-VN:VU#471084 | URL:http://www.kb.cert.org/vuls/id/471084 | MISC:http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt
Stack-based buffer overflow in Active Directory in Windows 2000 before SP4 allows remote attackers to cause a denial of service (reboot) and possibly execute arbitrary code via an LDAP version 3 search request with a large number of (1) "AND," (2) "OR," and possibly other statements, which causes LSASS.EXE to crash.
Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.
Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
Stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 allows local users to gain root privileges via a long LD_PRELOAD environment variable.
Assigned (20030728)
BUGTRAQ:20030729 Solaris ld.so.1 buffer overflow | URL:http://marc.info/?l=bugtraq&m=105951760418667&w=2 | IDEFENSE:20030729 Buffer Overflow in Sun Solaris Runtime Linker | URL:http://www.idefense.com/advisory/07.29.03.txt | OSVDB:8722 | URL:http://www.osvdb.org/8722 | OVAL:oval:org.mitre.oval:def:3601 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3601 | SUNALERT:55680 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55680 | XF:sun-ldso1-ldpreload-bo(12755) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/12755
Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name.
Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.
Multiple integer overflows in the font libraries for XFree86 4.3.0 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks.
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
Assigned (20030918)
BID:9011 | URL:http://www.securityfocus.com/bid/9011 | BUGTRAQ:20031111 EEYE: Windows Workstation Service Remote Buffer Overflow | URL:http://marc.info/?l=bugtraq&m=106859247713009&w=2 | BUGTRAQ:20031112 Proof of concept for Windows Workstation Service overflow | URL:http://marc.info/?l=bugtraq&m=106865197102041&w=2 | CERT:CA-2003-28 | URL:http://www.cert.org/advisories/CA-2003-28.html | CERT-VN:VU#567620 | URL:http://www.kb.cert.org/vuls/id/567620 | CISCO:20040129 Buffer Overrun in Microsoft Windows 2000 Workstation Service (MS03-049) | URL:http://www.cisco.com/warp/public/707/cisco-sa-20040129-ms03-049.shtml | MS:MS03-049 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-049 | OVAL:oval:org.mitre.oval:def:331 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A331 | OVAL:oval:org.mitre.oval:def:575 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A575
Stack-based buffer overflow in IBM DB2 Universal Data Base 7.2 before Fixpak 10 and 10a, and 8.1 before Fixpak 2, allows attackers with "Connect" privileges to execute arbitrary code via a LOAD command.
Stack-based buffer overflow in IBM DB2 Universal Data Base 7.2 for Windows, before Fixpak 10a, allows attackers with "Connect" privileges to execute arbitrary code via the INVOKE command.
Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
Assigned (20031119)
BID:8978 | URL:http://www.securityfocus.com/bid/8978 | CONFIRM:http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2 | CONFIRM:http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2 | FULLDISC:20031104 OpenBSD kernel overflow, yet still *BSD much better than windows | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html | MISC:http://www.guninski.com/msuxobsd2.html | OPENBSD:20031104 010: RELIABILITY FIX: November 4, 2003 | URL:http://www.openbsd.org/errata33.html | OPENBSD:20031105 005: RELIABILITY FIX: November 4, 2003 | URL:ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch
Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute.
Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion.
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.
Multiple buffer overflows in SmartFTP 1.0.973, and other versions before 1.0.976, allow remote attackers to execute arbitrary code via (1) a long response to a PWD command, which triggers a stack-based overflow, and (2) a long line in a response to a file LIST command, which triggers a heap-based overflow.
Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453.
Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
Stack-based buffer overflow in eZnet.exe, as used in eZ (a) eZphotoshare, (b) eZmeeting, (c) eZnetwork, and (d) eZshare allows remote attackers to cause a denial of service (crash) or execute arbitrary code, as demonstrated via (1) a long GET request and (2) a long operation or autologin parameter to SwEzModule.dll.
Assigned (20070923)
BUGTRAQ:20031207 eZ Multiple Packages Stack Overflow Vulnerability | URL:http://marc.info/?l=bugtraq&m=107090390002654&w=2 | BUGTRAQ:20031211 eZ and eZphotoshare fixes | URL:http://seclists.org/bugtraq/2003/Dec/0195.html | EXPLOIT-DB:133 | URL:https://www.exploit-db.com/exploits/133 | MISC:http://www.governmentsecurity.org/archive/t5390.html | SECTRACK:1008412 | URL:http://securitytracker.com/id?1008412
Stack-based buffer overflow in Far Manager 1.70beta1 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long pathname.