(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

临时决定:接受50各候选人最后(9/28)



我做了一个临时决定接受以下50名候选人。这些候选人没有足够选票一周前,所以董事会的反应在他们的选票让这些候选人被接受。周二我将做出最终决定,9月28日,这将使候选人的总数约为320。——史蒂夫= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0009:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 98.05。bind_problems参考:SGI: 19980603 - 01 - px参考:惠普:hpsbux9808 - 083参考:XF: bind-bo参考:太阳:00180逆查询缓冲区溢位在4.9绑定和绑定8版本。投票:接受(6)抑郁症,Northcutt,布莱克,普罗塞,Balinsky,利维= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0010:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 98.05。bind_problems参考:SGI: 19980603 - 01 - px参考:惠普:hpsbux9808 - 083参考:XF: bind-dos拒绝服务漏洞通过恶意格式化的DNS信息绑定8版本。投票:接受(4)抑郁症,布莱克,Northcutt,普罗塞= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0011:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:CERT: ca - 98.05。bind_problems参考:SGI: 19980603 - 01 - px参考:惠普:hpsbux9808 - 083参考:太阳:00180参考:XF: bind-axfr-dos拒绝服务漏洞在4.9绑定和绑定8版本通过CNAME记录和区域转移。修改:CHANGEREF XF: bind-dos XF: bind-axfr-dos选票:接受(2)布莱克,Northcutt修改(1)法国人评论:弗雷希>改变XF参考:弗雷希> XF: bind-axfr-dos = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0016:最终决定:阶段性裁决:19990925修改:19990925 - 02年提议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.28。Teardrop_Land参考:FreeBSD: FreeBSD-SA-98:01参考:惠普:hpsbux9801 - 076参考:思科:http://www.cisco.com/warp/public/770/land-pub.shtml参考:XF: cisco-land参考:XF:土地参考:XF: 95 - verv tcp参考:XF: land-patch参考:XF: ver-tcpip-sys土地IP拒绝服务修改:ADDREF惠普:hpsbux9801 - 076 ADDREF XF: ver-tcpip-sys DELREF XF: land-exploit选票:接受(4)Northcutt,布莱克,Balinsky, Ozancin修改(1)法国人评论:弗雷希> XF: ver-tcpip-sys(适用于支票,没有漏洞,因此不是弗雷希>上市网站)弗雷希> XF: land-exploit(过时,取而代之的是土地)= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0025:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.21。sgi_buffer_overflow参考:AUSCERT: AA-97.19.IRIX.df.buffer.overflow。vul参考:XF: df-bo root特权通过缓冲区溢出在SGI IRIX df命令系统。投票:接受(2)抑郁症,Ozancin = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0026:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.21。sgi_buffer_overflow参考:AUSCERT: AA-97.20.IRIX.pset.buffer.overflow。vul参考:XF: pset-bo root特权通过缓冲区溢出在SGI IRIX pset命令系统。投票:接受(3)弗雷希普罗塞,Ozancin = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0027:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.21。sgi_buffer_overflow参考:AUSCERT: AA-97.21.IRIX.eject.buffer.overflow。vul参考:XF: eject-bo root特权通过缓冲区溢出在SGI IRIX弹出命令系统。投票:接受(2)抑郁症,Ozancin = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0028:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.21。sgi_buffer_overflow参考:AUSCERT: AA-97.22.IRIX.login.scheme.buffer.overflow。vul参考:XF: sgi-schemebo root特权通过缓冲区溢出在SGI IRIX登录/计划命令系统。修改:ADDREF XF: sgi-schemebo选票:接受(1)普罗塞修改(2)抑郁症,Ozancin评论:弗雷希> XF: sgi-schemebo Ozancin > = >登录/计划= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0029:最终决定:阶段性裁决:19990925修改:建议:19990623分配:19990607类别:科幻参考:CERT: ca - 97.21。sgi_buffer_overflow参考:AUSCERT: aa - 97.23 - irix.ordist.buffer.overflow。vul参考:XF: ordist-bo root特权通过缓冲区溢出在SGI IRIX ordist命令系统。 VOTES: ACCEPT(2) Frech, Ozancin ================================= Candidate: CAN-1999-0037 Published: Final-Decision: Interim-Decision: 19990925 Modified: 19990925-01 Proposed: 19990630 Assigned: 19990607 Category: SF Reference: CERT:CA-97.14.metamail Reference: XF:metamail-header-commands Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail. Modifications: ADDREF XF:metamail-header-commands VOTES: ACCEPT(4) Hill, Prosser, Landfield, Northcutt MODIFY(1) Frech COMMENTS: Frech> XF:metamail-header-commands ================================= Candidate: CAN-1999-0059 Published: Final-Decision: Interim-Decision: 19990925 Modified: Proposed: 19990630 Assigned: 19990607 Category: SF Reference: NAI:NAI-16 Reference: XF:irix-fam IRIX fam service allows an attacker to obtain a list of all files on the server. VOTES: ACCEPT(3) Hill, Northcutt, Prosser MODIFY(1) Frech COMMENTS: Frech> XF:irix-fam ================================= Candidate: CAN-1999-0068 Published: Final-Decision: Interim-Decision: 19990925 Modified: 19990925-01 Proposed: 19990623 Assigned: 19990607 Category: SF Reference: XF:http-cgi-php-mylog Reference: BUGTRAQ:19971019 Vulnerability in PHP Example Logging Scripts CGI PHP mylog script allows an attacker to read any file on the target server. Modifications: ADDREF BUGTRAQ:19971019 Vulnerability in PHP Example Logging Scripts VOTES: ACCEPT(2) Frech, Northcutt MODIFY(1) Prosser COMMENTS: Prosser> add source Prosser> Bugtraq Prosser> "Vulnerability in PHP Example Logging Scripts" Prosser>http://www.securityfocus.com/bugtraq/1997_3/0560.html= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0075:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:BUGTRAQ: 19961016 Re: ftpd错误?是:bin / 1805: ftpd引用错误:XF: pasvcore PASV核心转储wu-ftpd守护进程时,攻击者使用一个引用PASV命令在指定一个用户名和密码。修改:ADDREF BUGTRAQ: 19961016 Re: ftpd错误?是:本/ 1805:Bug ftpd DESC更明确的区分可以- 1999 - 0076票:修改(2)弗雷希普罗塞评论:弗雷希>没有pasvcore记录;弗伦奇>删除和添加XF: ftp-pasvcore普罗塞>额外来源普罗塞>各种BUGTRAQ消息普罗塞>http://www.securityfocus.com/普罗塞>http://oliver.efri.hr/的crv /安全/错误/ SunOS / wuftpd7.html普罗塞>http://www.insecure.org/sploits= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0084:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: nfs-mknod NFS mknod bug选票:接受(5)山,抑郁症,Northcutt,学监,Balinsky = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0087:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: ibm-telnetdos参考:人:ERS-SVA-E01-1998:003.1拒绝服务在AIX telnet可能冻结系统并防止用户访问服务器。修改:ADDREF XF: ibm-telnetdos选票:接受莫尼耶希尔(1)修改(3),弗雷希,Landfield等待(2)Northcutt, Christey评论:贝>添加“STD0011:不正确或不完整的地址字段发现,忽略了“贝>区分从其他漏洞导致DOS在AIX telnet,莫尼耶>在未来可能会被发现。弗雷希> XF: ibm-telnetdos Christey >保持尽可能的简短描述,我们Christey >应该避免这个特定的细节,直到第二个AIX Christey > telnet DoS = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0095:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:CF参考:CERT: ca - 88.01参考:CERT: ca - 93.14参考:XF: smtp-debug Sendmail启用调试命令,允许攻击者执行命令作为根。修改:ADDREF CERT: ca - 88.01 ADDREF CERT: ca - 93.14 DESC变化来反映,它是一个配置问题投票:接受(7)山,抑郁症,布莱克,Northcutt,学监,Balinsky, Ozancin等待(1)Christey重塑(1)普罗塞评论:Northcutt >(我发誓我已经投过,这就是我如何进入Northcutt >计算机安全,有人闯入我的太阳WS这样做)普罗塞>有一个sendmail 8.6.7调试脆弱性:源普罗塞> CERT咨询ca - 94.12普罗塞>http://www.cert.org普罗塞>以及一个年长5.59 BSD sendmail调试脆弱性普罗塞> CERT咨询ca - 88.01, 96.20, 24日和25日普罗塞>哪一个我们讲Christey >史蒂夫的一些选票迷路了。我发现他们和Christey >重新回到他们,用他的最新投票Christey >发生冲突的地方。Christey > Christey >证书报告,提到的一些报告Christey >迈克被别人取代,而不是可用Christey > CERT的网站。然而,这个条目引用Christey >当Sendmail配置调试选项启用,Christey >,是指在ca - 88.01和- 93.14。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0096:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:CF参考:CERT: ca - 93.16参考:CERT: ca - 95.05参考:CIAC: 13参考:CIAC: 14参考:太阳:00122参考:XF: smtp-dcod Sendmail解码别名可以用来覆盖敏感文件的修改:ADDREF CERT: ca - 93.16 ADDREF CERT: ca - 95.05 ADDREF CIAC: 13 ADDREF CIAC: 14 ADDREF太阳:00122票:接受(7)山,抑郁症,布莱克,Northcutt,学监,Balinsky, Ozancin修改(1)普罗塞评论:普罗塞>额外来源普罗塞> CERT咨询CA-93:16 ca - 95.05普罗塞>http://www.cert.org普罗塞>太阳安全公告00122普罗塞>http://www.sunsolve.sun.com= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0126:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:CERT: VB-98.04.xterm。Xaw参考:CIAC: j - 010参考:XF: xfree86-xterm-xaw参考:XF: xfree86-xaw SGI IRIX缓冲区溢出在xterm和Xaw允许根访问。修改:ADDREF XF: xfree86-xterm-xaw ADDREF XF: xfree86-xaw选票:接受(3)Northcutt,普罗塞,Ozancin修改(1)法国人评论:弗雷希> XF: xfree86-xterm-xaw弗雷希> XF: xfree86-xaw = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0138:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:CERT: ca - 96.12。suidperl_vul参考:XF: sperl-suid suidperl和sperl程序不要放弃root特权时更改uid回到原来的用户,允许根访问。修改:ADDREF XF: sperl-suid选票:接受(1)普罗塞修改(1)法国人评论:弗雷希> XF: sperl-suid = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0150:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: perl-fingerd Perl fingerd程序允许从远程用户任意命令执行。修改:ADDREF XF: perl-fingerd选票:接受(3)山,Northcutt,普氏修改(1)法国人评论:弗雷希> XF: perl-fingerd = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0152:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:BUGTRAQ: 19970811 dgux。fingerd脆弱性参考:XF: dgux-fingerd DG / UX手指守护进程通过shell元字符允许远程命令执行。修改:ADDREF BUGTRAQ: 19970811 dgux。fingerd脆弱性选票:接受(5)山,抑郁症,Northcutt,天天p, Balinsky修改(1)普罗塞评论:普罗塞>额外资源普罗塞> Bugtraq普罗塞> dgux”。fingerd脆弱性”普罗塞>http://www.securityfocus.com/= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0167:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: nfs-guess参考:CERT: CA-91.21.SunOS.NFS.Jumbo.and。在SunOS fsirand, NFS文件句柄可以猜到了,给未经授权的访问导出的文件系统。修改:ADDREF CERT: CA-91.21.SunOS.NFS.Jumbo.and。fsirand选票:接受(6)山,抑郁症,布莱克,Northcutt,天天p, Balinsky修改(1)普罗塞评论:普罗塞>的老歌《源普罗塞> CERT安全警报CA-91:21普罗塞>http://www.cert.org= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0175:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: http-nov-convert转换。bas程序在Novell网络服务器允许远程攻击者读取系统上的任何文件内部访问的web服务器。投票:接受(4)希尔,抑郁症,布莱克,Northcutt = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0183:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: linux-tftp TFTP的Linux实现将允许访问限制之外的文件目录。投票:接受(3)希尔,抑郁症,Landfield等待(1)Northcutt = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0202:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: ftp-exectar GNU tar命令,使用时在FTP会话,可能允许攻击者执行任意命令。投票:接受(4)希尔,抑郁症,Northcutt,天天p = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0204:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: ident-bo Sendmail 8.6.9允许远程攻击者执行根命令,使用鉴别。修改:ADDREF XF: ident-bo选票:接受(3)山,Balinsky, Landfield等待(1)Northcutt回顾(1)法国人评论:弗雷希>可能XF: ident-bo = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0245:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:BUGTRAQ: 19950907洞和修复参考Linux NIS安全问题:XF: linux-plus某些配置NIS +在Linux中允许攻击者作为用户登录“+”修改:参考ADDREF BUGTRAQ: 19950907 Linux NIS洞和修复票安全问题:接受(3)山,抑郁症,Northcutt修改(1)普罗塞评论:普罗塞普罗塞> BUGTRAQ普罗塞> >来源“Linux NIS安全问题洞和修复”普罗塞>http://www.securityfocus.com/= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0260:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:BUGTRAQ: 19961224 jj cgi参考:XF: http-cgi-jj jj cgi程序允许通过shell元字符命令执行。修改:ADDREF XF: http-cgi-jj ADDREF BUGTRAQ: 19961224 jj cgi选票:接受(2)山,弗伦奇等待Ozancin修改(1)(2)Northcutt, Landfield评论:弗雷希> XF: http-cgi-jj = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0273:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: sun-telnet-kill拒绝服务通过Solaris 2.5.1 telnet发送^ D字符。修改:ADDREF XF: sun-telnet-kill选票:接受(3)山,布莱克,弗伦奇等待Northcutt修改(1)(1)默评论:弗雷希> XF: sun-telnet-kill = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0281:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:XF: http-iis-longurl拒绝服务在IIS中使用长url。修改:ADDREF XF: http-iis-longurl选票:接受(6)山,布莱克,墙,Balinsky, Ozancin, Northcutt修改(1)法国人评论:弗雷希> XF: http-iis-longurl = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0289:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻Win32的Apache web服务器可以提供访问限制的文件时。(点)附加到请求的URL。投票:接受(4)山,布莱克,Landfield, Ozancin等待(1)Northcutt回顾(1)法国人= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0346:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:XF: PHP mlog http-cgi-php-mlog CGI脚本允许攻击者阅读目标服务器上的任何文件。修改:ADDREF XF: http-cgi-php-mlog选票:接受(2)Northcutt,普氏修改(1)法国人评论:弗雷希> XF: http-cgi-php-mlog = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0348:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:NTBUGTRAQ: Jan27, 1999参考:MSKB: Q197003 IIS ASP缓存问题发布敏感信息当两个虚拟服务器共享同一物理目录。修改:ADDREF MSKB: Q197003票:接受(4)Northcutt,普罗塞,墙,利维回顾(1)法国人评论:普罗塞>附加源普罗塞>知识库文章女士Q197003普罗塞>http://support.microsoft.com/support/kb/articles/q197/0/03.asp= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0350:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:L0PHT: Feb8, 1999参考:XF: clearcase-temp-race竞争条件在ClearCase db_loader项目给当地用户root访问通过设置SUID位。修改:ADDREF XF: clearcase-temp-race选票:接受(3)山,普罗塞,Northcutt修改(1)法国人评论:弗雷希> XF: clearcase-temp-race = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0362:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:达:AD02021999参考:XF: wsftp-remote-dos参考:科幻小说:217 WS_FTP服务器远程通过慢性消耗病命令拒绝服务。投票:接受(4)Ozancin,抑郁症,Northcutt,利维等待墙(1)= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0368:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990623分配:19990607类别:科幻参考:NETECT:棕榈。ftpd参考:CERT: ca - 99.03参考:XF: palmetto-ftpd-bo缓冲区溢出在wuarchive ftpd (wu-ftpd)和ProFTPD导致远程root访问,又名棕榈。修改:ADDREF XF: palmetto-ftpd-bo选票:接受(2)Northcutt,普罗塞修改(1)法国人评论:弗雷希> XF: palmetto-ftpd-bo = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0383:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990726分配:19990607类别:科幻参考:BUGTRAQ: Feb02, 1999参考:XF: acc-tigris-login ACC底格里斯河允许公众访问没有登录。修改:DESC改变允许允许一致性选票:接受(1)Ozancin弗伦奇等待修改(1)(3)墙,Northcutt Landfield评论:弗雷希>改变允许允许。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0388:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: datalynx-suguard-relative-paths参考:L0PHT: Jan3, 1999 DataLynx suGuard信托PATH环境变量执行ps命令,允许本地用户执行命令作为根。投票:接受(4)希尔,抑郁症,普罗塞,Northcutt = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0391:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:L0PHT:简。1999的密码挑战SMB身份验证重用在Windows 95, Windows 98,允许攻击者重放和inpersonate用户的响应。投票:接受(4)山、Northcutt Landfield,利维回顾(1)法国人= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0412:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:BUGTRAQ: Feb19, 1999参考:XF: iis-isapi-execute参考:科幻小说:501在IIS和其他web服务器,攻击者可以攻击命令系统服务器是否正在运行系统和加载一个ISAPI扩展。投票:接受(2)墙等待法国人? (1)Ozancin = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0424:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:SUSE: Mar18, 1999参考:XF: netscape-talkback-overwrite反馈在Netscape 4.5允许本地用户覆盖任意文件的另一个用户的网景崩溃。 VOTES: ACCEPT(3) Ozancin, Frech, Prosser REVIEWING(1) Wall COMMENTS: Prosser> source should be Prosser> SuSE Security Announcements Prosser> "Security hole in Netscape Communicator's 4.5 'talkback' function" Prosser>http://www.suse.de/security= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0425:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:SUSE: Mar18, 1999参考:XF: netscape-talkback-kill反馈在Netscape 4.5允许本地用户杀死任意进程的另一个用户的网景崩溃。投票:接受(3)Ozancin、弗雷希普罗塞回顾(1)墙评论:普罗塞>再次来源应该是普罗塞> SuSE安全公告普罗塞>“安全漏洞在Netscape沟通者的4.5“反馈”功能”普罗塞>http://www.suse.de/security= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0437:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:国际空间站:WebRamp拒绝服务攻击参考:XF: webramp-device-crash远程攻击者可以执行拒绝服务WebRamp系统通过发送一个恶意的字符串到HTTP端口。修改:ADDREF XF: webramp-device-crash选票:接受(2)山,贝弗伦奇等待修改(1)(2)Northcutt, Landfield评论:弗雷希> XF: webramp-device-crash Landfield >,真的应该指定版本= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0438:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:国际空间站:WebRamp拒绝服务攻击参考:XF: webramp-ipchange远程攻击者可以执行拒绝服务WebRamp系统通过发送恶意UDP端口5353包,改变其IP地址。修改:ADDREF XF: webramp-ipchange选票:接受(2)山,贝弗伦奇等待修改(1)(2)Northcutt, Landfield评论:弗雷希> XF: webramp-ipchange Landfield >,真的应该指定版本= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0448:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:XF: iis-http-request-logging IIS 4.0和Apache HTTP请求日志方法,不管多长时间,允许远程攻击者隐藏他们真的请求的URL。投票:接受(3)墙,法国人?利维等待(2)Ozancin, Landfield = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0449:最终决定:阶段性裁决:19990925修改:建议:19990726分配:19990607类别:科幻参考:BUGTRAQ: Jan26, 1999参考:XF: iis-exair-dos参考:科幻小说:193在IIS 4拒绝服务的脚本ExAir示例站点。投票:接受(4)墙,抑郁症,Northcutt,利维= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0458:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:科幻参考:BUGTRAQ: Jan6, 1999参考:XF: l0phtcrack-temp-files L0phtcrack 2.5使用临时文件在系统临时目录可以包含密码信息。修改:ADDREF XF: l0phtcrack-temp-files选票:接受(3)山,普罗塞,弗伦奇等待Northcutt修改(1)(2)Landfield,利维评论:弗雷希> XF: l0phtcrack-temp-files = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0494:最终决定:阶段性裁决:19990925修改:建议:19990630分配:19990607类别:科幻参考:XF: wingate-pop3-user-bo拒绝服务在温盖特代理通过POP3的缓冲区溢出。投票:接受(5)希尔,抑郁症,Northcutt, Landfield, Ozancin = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0514:最终决定:阶段性裁决:19990925修改:19990925 - 01提议:19990630分配:19990607类别:CF参考:XF: fraggle UDP消息广播地址是允许的,允许fraggle攻击可以通过洪水导致拒绝服务目标。修改:ADDREF XF: fraggle DESC澄清在Landfield促使选票:接受(2)山,Northcutt弗伦奇审查修改(1)(1)Landfield评论:弗雷希> XF: fraggle Landfield >系统?一般栈的问题?这是不清楚的。 ================================= Candidate: CAN-1999-0526 Published: Final-Decision: Interim-Decision: 19990925 Modified: 19990925-01 Proposed: 19990630 Assigned: 19990607 Category: CF Reference: XF:xcheck-keystroke An X server's access control is disabled (e.g. through an "xhost +" command) and allows anyone to connect to the server. Modifications: ADDREF XF:xcheck-keystroke DESC Rephrase per Northcutt's suggestion VOTES: ACCEPT(4) Hill, Blake, Proctor, Balinsky MODIFY(2) Frech, Northcutt COMMENTS: Frech> XF:xcheck-keystroke Northcutt> X does have some access control as long as a user (insider) doesn't type Northcutt> "xhost +". I don't think an outsider can disable the access. Northcutt> Suggested phrasing "An X server's access control can be disabled e.g. Northcutt> through an "xhost +" command and allows anyone to connect to the server."

页面最后更新或审查:2007年5月22日,