CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Teardrop IP denial of service. |
Delete or create a file via rpc.statd, due to invalid information. |
Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. |
Buffer overflow in xlock program allows local users to execute commands as root. |
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. |
Sun's ftpd daemon can be subjected to a denial of service. |
Vacation program allows command execution by remote users through a sendmail command. |
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. |
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. |
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2. |
Buffer overflow in ffbconfig in Solaris 2.5.1. |
Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. |
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death. |
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. |
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. |
Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access. |
Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. |
In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system. |
The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. |