Show filters
215 Total Results
Displaying 181-190 of 215
Sort by:
Attacker Value
Unknown
CVE-2004-1270
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.
0
Attacker Value
Unknown
CVE-2004-0949
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
0
Attacker Value
Unknown
CVE-2004-1013
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown
CVE-2004-1071
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2004-1268
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
0
Attacker Value
Unknown
CVE-2004-1269
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
0
Attacker Value
Unknown
CVE-2004-1171
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user's .desktop file, which may be created with world-readable permissions, which could allow local users to obtain usernames and passwords for remote resources such as SMB shares.
0
Attacker Value
Unknown
CVE-2004-1015
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
0
Attacker Value
Unknown
CVE-2004-1011
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
0
Attacker Value
Unknown
CVE-2004-0883
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
0