(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群RECENT-12 - 20的候选人



下面的集群包含20个候选人公布2月27日至3月3日,2000年。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。如果你发现任何RECENT-XX集群是不完整的对过程中发现的问题相关的时间框架,请发送信息给我,这样候选人可以被指定。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ================================= Candidate: CAN-2000-0172 Published: Final-Decision: Interim-Decision: Modified: Proposed: 20000322 Assigned: 20000322 Category: SF Reference: BUGTRAQ:20000303 Potential security problem with mtr Reference: DEBIAN:20000309 mtr Reference: URL:http://archives.neohapsis.com/archives/vendor/2000-q1/0032.html参考:FREEBSD: FreeBSD-SA-00:09参考:网址:http://www.securityfocus.com/templates/advisory.html?id=2131参考:BUGTRAQ: 20000308 (TL-Security-Announce)地铁- 0.41和更早的TLSA2000003-1 (fwd)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0072.html参考:报价:1038参考:网址:http://www.securityfocus.com/bid/1038地铁项目不合理放弃特权,这可能允许本地用户获得特权。ED_PRI - 2000 - 0172 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0196:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻参考:DEBIAN: 20000228远程利用nmh参考:网址:http://www.debian.org/security/2000/20000229引用:引用URL::报价:1018参考:网址:http://www.securityfocus.com/bid/1018缓冲区溢出在Linux mhshow nmh包允许远程攻击者执行命令通过畸形MIME头在电子邮件消息。ED_PRI - 2000 - 0196 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0208:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000228 ht: / /挖远程信息暴露参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.4.10.10002281422420.30728 - 100000 @wso.williams.edu参考:FREEBSD: FreeBSD-SA-00:06参考:网址:http://www.securityfocus.com/templates/advisory.html?id=2107参考:DEBIAN: 20000226远程用户可以读取文件与网络服务器uid参考:网址:http://www.debian.org/security/2000/20000227参考:涡轮:TLSA200005-1参考:网址:http://www.securityfocus.com/templates/advisory.html?id=2113参考:报价:1026参考:网址:http://www.securityfocus.com/bid/1026htdig (ht: / /挖)CGI程序htsearch封闭允许远程攻击者读取任意文件的文件名参数htsearch引号(')。ED_PRI - 2000 - 0208 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0209:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000227猞猁,有人又聋又盲,)参考网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.4.21.0002271629490.15796 - 100000 @dione.ids.pl参考:FREEBSD: FreeBSD-SA-00:08参考:网址:http://www.securityfocus.com/templates/advisory.html?id=2127参考:报价:1012参考:网址:http://www.securityfocus.com/bid/1012缓冲区溢出猞猁2。x允许远程攻击者可能崩溃猞猁和执行命令通过一个长URL恶意网页。ED_PRI - 2000 - 0209 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0178:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000227咨询:铸造网络ServerIron TCP / IP序列可预测性参考:MISC:http://www.foundrynet.com/bugTraq.html参考:报价:1017参考:网址:http://www.securityfocus.com/bid/1017ServerIron铸造网络交换机的可预测的TCP / IP序列号,它允许远程攻击者恶搞或劫持会话。ED_PRI - 2000 - 0178 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0186:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000228 (Hackerslab bug_paper] Linux转储缓冲区溢位参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0375.html参考:涡轮:TLSA200007-1参考:网址:http://www.securityfocus.com/templates/advisory.html?id=2130参考:报价:1020参考:网址:http://www.securityfocus.com/bid/1020缓冲区溢出的转储工具在Linux ext2fs备份包允许本地用户获得特权通过命令行参数。ED_PRI - 2000 - 0186 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0189:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:NTBUGTRAQ: 20000301 coldfusion应用程序。cfm显示完整路径参考:网址:http://archives.neohapsis.com/archives/ntbugtraq/current/0178.html参考:BUGTRAQ: 20000305 ColdFusion错误:应用程序。cfm显示完整路径参考:网址:http://archives.neohapsis.com/archives/bugtraq/current/0033.html参考:报价:1021参考:网址:http://www.securityfocus.com/bid/1021ColdFusion服务器4。x允许远程攻击者决定的真实路径名通过HTTP请求到应用程序服务器。cfm或onrequestend。cfm文件。ED_PRI - 2000 - 0189 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0191:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000229 Infosec.20000229.axisstorpointcd。参考网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=41256894.00492503.00@mailgw.backupcentralen.se参考:报价:1025参考:网址:http://www.securityfocus.com/bid/1025轴StorPoint CD允许远程攻击者访问管理员url没有身份验证通过。(点点)攻击。ED_PRI - 2000 - 0191 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0176:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000228 Serv-U ftp服务器v2.4a显示真正的路径参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0417.html参考:电脑,2月20日,2000参考:报价:1016参考:网址:http://www.securityfocus.com/bid/1016Serv-U 2.5 d和早的默认配置允许远程攻击者来确定服务器的请求URL的路径名的目录或文件不存在。ED_PRI - 2000 - 0176 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0177:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000302 DNSTools v1.08没有输入验证参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0000.html参考:报价:1028参考:网址:http://www.securityfocus.com/bid/1028DNSTools CGI应用程序允许远程攻击者通过shell元字符执行任意命令。ED_PRI - 2000 - 0177 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0179:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000228惠普Omniback远程DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0387.html参考:报价:1015参考:网址:http://www.securityfocus.com/bid/1015惠普OpenView OmniBack 2.55允许远程攻击者通过大量导致拒绝服务连接到端口5555。ED_PRI - 2000 - 0179 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0187:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻参考:BUGTRAQ: 3.0 20000227 EZ顾客购物车CGI远程命令执行参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html参考:报价:1014参考:网址:http://www.securityfocus.com/bid/1014loadpage 3.0在线商城。cgi cgi脚本允许远程攻击者读取任意文件通过一个. .(点点)攻击或执行命令通过shell元字符。ED_PRI - 2000 - 0187 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0188:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻参考:BUGTRAQ: 3.0 20000227 EZ顾客购物车CGI远程命令执行参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html参考:报价:1014参考:网址:http://www.securityfocus.com/bid/10143.0在线商城搜索。cgi cgi脚本允许远程攻击者读取任意文件通过一个. .(点点)攻击或执行命令通过shell元字符。ED_PRI - 2000 - 0188 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0190:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻参考:BUGTRAQ: 20000303 Aol的即时通讯DoS脆弱性参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0016.htmlAOL的即时通讯(AIM)客户端允许远程攻击者造成拒绝服务通过一条消息,该消息带有一个畸形的ASCII值。ED_PRI - 2000 - 0190 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0193:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000302 Corel Linux 1.0 dosemu默认配置:本地根vuln参考:http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168@jawa.chilli.net.au参考:报价:1030参考:网址:http://www.securityfocus.com/bid/1030默认配置的Dosemu Corel Linux 1.0允许本地用户执行system.com程序和获得的特权。ED_PRI - 2000 - 0193 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0201:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000301 IE 5。x允许使用chm文件执行任意程序参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-02/0408.html参考:报价:1033参考:网址:http://www.securityfocus.com/bid/1033window.showHelp()方法在Internet Explorer 5。x不限制HTML帮助文件(chm)执行从本地主机,远程攻击者可以通过微软网络执行任意命令。ED_PRI - 2000 - 0201 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0205:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000303 TrendMicro OfficeScan,大量的安全漏洞,远程文件修改。参考:http://archives.neohapsis.com/archives/bugtraq/2000-03/0015.html参考:BUGTRAQ: 20000315趋势科技发布补丁“OfficeScan DoS和消息重放”V ulnerabilies参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=d129bbe1730ad2118a0300805fc1c2fe038af28b@209 - 76 - 212 - 10. - trendmicro.com参考:MISC:http://www.antivirus.com/download/ofce_patch_35.htm参考:报价:1013参考:网址:http://www.securityfocus.com/bid/1013Trend Micro OfficeScan允许远程攻击者重放OfficeScan行政命令和修改配置客户端。ED_PRI - 2000 - 0205 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0207:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000301 infosrch。cgi漏洞(IRIX 6.5)参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.4.10.10003021059360.21162 - 100000 @inetarena.com参考:报价:1031参考:网址:http://www.securityfocus.com/bid/1031SGI InfoSearch infosrch CGI程序。cgi允许远程攻击者通过shell元字符执行命令。ED_PRI - 2000 - 0207 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0216:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:NTBUGTRAQ: 20000229 mailbombing DoS容易利用女士对邮件系统使用的邮件客户端。参考网址:http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0176.html微软Outlook电子邮件客户端,交流,和Windows消息自动回复阅读收据和交付收据标签,这可能允许攻击者洪水邮件系统通过建立阅读收据与响应请求重定向到一个大型分布列表。ED_PRI - 2000 - 0216 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0225:最终决定:阶段性裁决:修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000303 Pocsag远程访问客户端不能被禁用。参考网址:a8c0@firewalker a090 http://www.securityfocus.com/templates/archive.pike?list=1&msg=003601bf854b 6893美元0100美元参考:报价:1032参考:网址:http://www.securityfocus.com/bid/1032的Pocsag POC32程序不正确阻止远程用户访问服务器端口,即使已经禁用的选项。ED_PRI - 2000 - 0225 3投票:

页面最后更新或审查:2007年5月22日,