(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(临时)接受34候选人从各种集群(最后的4/24)



我临时决定接受以下34候选人从不同的集群。周一我将做出最终决定,2000年4月24日。候选人来自以下集群:1 RESTLOW RECENT-01 1网络2 MISC-01 4 UNIX-UNCONF 2 NET-01 4 RECENT-03 8 RECENT-04 1 RECENT-05 2 RECENT-06 1 RECENT-08 1近10 6 RECENT-13选民:墙接受(2)无操作(10)勒布朗等待(17)Ozancin接受(12)等待(5)科尔接受(18)无操作(2)默接受(1)Stracener接受(21)修改(1)弗雷希修改(28)希尔接受(1)Northcutt接受(1)Christey等待(11)阿姆斯特朗接受(9)Balinsky接受(1)普罗塞接受布莱克(6)接受(12)无操作(1)= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0203:最终决定:阶段性裁决:20000418修改:20000418 - 02年提议:19990630分配:19990607类别:科幻参考:CERT: ca - 95.08参考:CIAC: e 03参考:XF: smtp-sendmail-version5 Sendmail,攻击者可以获得根权限通过SMTP通过指定一个不当“邮件从“地址和一个无效的“收件人”地址,导致邮件反弹一个程序。修改:ADDREF CERT: ca - 95.08 ADDREF CIAC: e 03 ADDREF XF: smtp-sendmail-version5推断行动:- 1999 - 0203能接受(5接受,2 ack, 0评论)目前投票:接受(5)山,布莱克,Balinsky, Ozancin,弗伦奇等待Northcutt修改(1)(1)Christey评论:Christey >描述需要更具体的区分Christey > - 1999 - 0163,所提到的亚当·弗伦奇> Shostack XF: smtp-sendmail-version5 = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0780:最终决定:阶段性裁决:20000418修改:20000313 - 01提议:19991222分配:19991125类别:科幻参考:BUGTRAQ: 19981118多个KDE安全漏洞(根妥协)参考:网址:http://www.netspace.org/cgi-bin/wa?A2=ind9811C&L=bugtraq&P=R2457参考:XF: kde-klock-process-kill KDE klock纽约允许本地用户杀死任意进程通过指定任意.kss PID。pid文件。修改:ADDREF XF: kde-klock-process-kill推断行动:- 1999 - 0780能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,弗伦奇等待Ozancin修改(1)(2)Christey,勒布朗评论:弗雷希> XF: kde-klock-process-kill Christey >这个候选人是由供应商未经证实的。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0781:最终决定:阶段性裁决:20000418修改:20000313 - 01提议:19991222分配:19991125类别:科幻参考:BUGTRAQ: 19981118多个KDE安全漏洞(根妥协)参考:网址:http://www.netspace.org/cgi-bin/wa?A2=ind9811C&L=bugtraq&P=R2457参考:XF: kde-klock-bindir-trojans KDE允许本地用户执行任意命令通过设置环境变量KDEDIR修改KDE使用定位其可执行文件的搜索路径。修改:ADDREF XF: kde-klock-bindir-trojans推断行动:- 1999 - 0781能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,弗伦奇等待Ozancin修改(1)(2)Christey,勒布朗评论:弗雷希> XF: kde-klock-bindir-trojans Christey >这个候选人是由供应商未经证实的。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0782:最终决定:阶段性裁决:20000418修改:20000313 - 01提议:19991222分配:19991125类别:科幻参考:BUGTRAQ: 19981118多个KDE安全漏洞(根妥协)参考:网址:http://www.netspace.org/cgi-bin/wa?A2=ind9811C&L=bugtraq&P=R2457参考:XF: kde-kppp-directory-create KDE kppp允许本地用户在任意位置创建一个目录通过家庭环境变量。修改:ADDREF XF: kde-kppp-directory-create推断行动:- 1999 - 0782能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,弗伦奇等待Ozancin修改(1)(2)Christey,勒布朗评论:弗雷希> kde-kppp-directory-create Christey >这个候选人是由供应商未经证实的。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0803:最终决定:阶段性裁决:20000418修改:20000313 - 01提议:19991222分配:19991125类别:科幻参考:BUGTRAQ: 19990525 IBM AIX参考eNetwork防火墙:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=92765973207648&w=2参考:XF: ibm-enfirewall-tmpfiles fwluser脚本在AIX eNetwork防火墙允许本地用户编写任意文件通过一个符号链接攻击。修改:CHANGEREF BUGTRAQ[添加日期]ADDREF XF: ibm-enfirewall-tmpfiles推断行动:- 1999 - 0803能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,弗伦奇等待Ozancin修改(1)(2)Christey,勒布朗评论:弗雷希> XF:弗伦奇> ibm-efirewall-tmpfiles BUGTRAQ:添加19990525 Christey >这个候选人是由供应商未经证实的。Christey > Christey >海报声称APAR (IR39562)创建。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0824:最终决定:阶段性裁决:20000418修改:建议:19991208分配:19991207类别:科幻参考:报价:833参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=833参考:NTBUGTRAQ: 19991130参考路径替换问题:BUGTRAQ: 19991130 Subst.exe粗心(fwd) Windows NT用户可以使用路径替换一个驱动器映射到一个文件夹,这并不是未映射用户注销后,可能允许用户修改后用户访问文件夹的位置。推断行动:- 1999 - 0824能接受(4接受,0 ack, 0评论)目前投票:接受(3)Stracener,普罗塞,阿姆斯特朗弗伦奇等待修改(1)(1)科尔评论:弗雷希> XF: nt-subst = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0889:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991208类别:科幻参考:BUGTRAQ: 675思科19990810密码胡说参考:XF: cisco-cbos-telnet思科675路由器运行当地允许远程攻击者建立telnet会话如果一个高管或超级用户密码没有设置修改:ADDREF XF: cisco-cbos-telnet推断行动:- 1999 - 0889能接受(3接受0 ack, 0评论)目前投票:接受(2)科尔,Stracener修改(1)法国人评论:弗雷希> XF: cisco-cbos-telnet = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0895:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991208类别:科幻参考:BUGTRAQ: 19991020检查点防火墙1 V4.0:可能的错误在LDAP身份验证参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991020150002.21047.qmail@tarjan.mediaways.net参考报价:725参考:XF: checkpoint-ldap-auth防火墙1不适当限制访问LDAP属性。修改:ADDREF报价:725 ADDREF XF: checkpoint-ldap-auth推断行动:- 1999 - 0895能接受(3接受0 ack, 0评论)目前投票:接受(2)科尔,弗伦奇等待Stracener修改(1)(2)Christey,勒布朗评论:Christey >这个候选人是由供应商未经证实的。弗雷希> XF: checkpoint-ldap-auth = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0897:最终决定:阶段性裁决:20000418修改:20000418 - 02年提议:19991214分配:19991208类别:科幻参考:BUGTRAQ: 19980908错误iChat 3.0(可能)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=90538488231977&w=2参考:XF: ichat-file-read-vuln iChat房间网络服务器允许远程攻击者读取任意文件通过一个. .(点点)攻击。正确修改:ADDREF XF: ichat-file-read-vuln CHANGEREF BUGTRAQ[日期]推断行动:- 1999 - 0897能接受(3接受0 ack, 0评论)目前投票:接受(2)布莱克,弗伦奇等待Stracener修改(1)(3)科尔,Christey,勒布朗评论:Christey >这个候选人是由供应商未经证实的。Christey > Christey >两个Bugtraq后续索赔问题已经解决。弗雷希> XF: ichat-file-read-vuln弗雷希> BUGTRAQ:参考日期可能是错误的。确认它不是199 _8_0908。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0950:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991208类别:科幻参考:BUGTRAQ: 19991027 WFTPD v2.40 FTPServer远程利用缓冲区溢出漏洞参考:报价:747参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=747参考:XF: wftpd-mkd-bo缓冲区溢出WFTPD FTP服务器允许远程攻击者获得root访问通过一系列MKD和慢性消耗病的命令创建嵌套目录。修改:ADDREF XF: wftpd-mkd-bo推断行动:- 1999 - 0950 ACCEPT_ACK(2接受,1 ack, 0评论)目前投票:接受(1)Stracener修改(1)法国人评论:弗雷希> XF: wftpd-mkd-bo = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0957:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991208类别:科幻参考:BUGTRAQ: 19970618安全漏洞MajorCool 1.0.3参考:XF: majorcool-file-overwrite-vuln MajorCool mj_key_cache程序允许本地用户修改文件通过一个符号链接攻击。修改:ADDREF XF: majorcool-file-overwrite-vuln推断行动:- 1999 - 0957能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,贝弗伦奇的评论修改(1):法国人> XF: majorcool-file-overwrite-vuln = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0997:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991221类别:CF参考:BUGTRAQ: 19991220安全漏洞在某些wu-ftpd(导数)配置(fwd)参考:XF: wuftp-ftp-conversion wu-ftp启用了FTP转换允许攻击者执行命令通过一个畸形的文件名作为参数解释的程序执行转换,如焦油或解压。修改:ADDREF XF: wuftp-ftp-conversion推断行动:- 1999 - 0997能接受(4接受,0 ack, 0评论)目前投票:接受(3)墙,科尔,弗伦奇等待Stracener修改(1)(2)Christey,勒布朗评论:弗雷希> XF: wuftp-ftp-conversion Christey >这个候选人是由供应商未经证实的。Christey > XF: wuftp-ftp-conversion并不存在。Christey > Christey >发布通过suid@suid.kg。看到http://www.suid.edu/advisories/001.txtChristey >详情。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 1005:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991221类别:科幻参考:BUGTRAQ: 19991219 Groupewise Web界面参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94571433731824&w=2参考:XF: groupwise-web-read-files参考:报价:879 GWWEB Groupwise web服务器。EXE与. htm扩展允许远程攻击者读取任意文件通过一个. .(点点)攻击使用参数的帮助。修改:ADDREF XF: groupwise-web-read-files ADDREF报价:879推断行动:- 1999 - 1005能接受(3接受0 ack, 0评论)目前投票:接受(2)科尔,弗伦奇等待Stracener修改(1)(3)墙,Christey,勒布朗评论:弗雷希> XF: groupwise-web-read-files Christey >这个候选人是由供应商未经证实的。Christey > XF: groupwise-web-read-files并不存在。Christey > Christey >多个Bugtraq跟踪显示问题可能比当前更Christey >严重CVE描述说明。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 1007:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991221类别:科幻参考:BUGTRAQ: 19991213 VDO生活玩家3.02缓冲区溢位参考:http://marc.theaimsgroup.com/?l=bugtraq&m=94512259331599&w=2参考:XF: vdolive-bo-execute参考:报价:872参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=872缓冲区溢出VDO生活玩家允许远程攻击者通过畸形.vdo VDO客户机上执行命令文件。修改:ADDREF XF: vdolive-bo-execute推断行动:- 1999 - 1007能接受(4接受,0 ack, 0评论)目前投票:接受(3)墙,科尔,弗伦奇等待Stracener修改(1)(2)Christey,勒布朗评论:弗雷希> XF: vdolive-bo-execute Christey >这个候选人是由供应商未经证实的。Christey > XF: vdolive-bo-execute并不存在。Christey > Christey >影子企鹅UNYUN发布的安全。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 1010:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:19991222分配:19991221类别:科幻参考:BUGTRAQ: 19991214 sshd1允许加密会话不管服务器策略引用:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94519142415338&w=2参考:XF: ssh-policy-bypass SSH 1.2.27服务器允许客户端使用“没有”密码,即使它是服务器不允许的政策。修改:ADDREF XF: ssh-policy-bypass推断行动:- 1999 - 1010能接受(3接受0 ack, 0评论)目前投票:接受(2)科尔,弗伦奇等待Stracener修改(1)(3)墙,Christey,勒布朗评论:弗雷希> XF: ssh-policy-bypass Christey >这个候选人是由供应商未经证实的。= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0010:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991226 WebWho +咨询参考:XF: http-cgi-webwhoplus WebWho +域名查询服务。cgi程序允许远程攻击者通过执行命令shell元字符的TLD参数。修改:ADDREF XF: http-cgi-webwhoplus推断行动:- 2000 - 0010能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> http-cgi-webwhoplus = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0012:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991227远程缓冲区溢出在miniSQL参考:报价:898参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=898参考:XF: w3-msql-scanf-bo w3-msql CGI程序的缓冲区溢出miniSQL包允许远程攻击者执行命令。修改:ADDREF XF: w3-msql-scanf-bo推断行动:- 2000 - 0012能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: w3-msql-scanf-bo = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0014:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991228本地/远程原产。年代袭击莎凡特Web服务器版本都/ NT / 2 k参考:报价:897参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=897参考:XF: savant-server-null-dos拒绝服务专家通过null字符web服务器的请求的URL。修改:ADDREF XF: savant-server-null-dos推断行动:- 2000 - 0014能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: savant-server-null-dos = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0020:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:远程原产NTBUGTRAQ: 19991221。年代袭击DNS PRO v5.7 WinNT FBLI软件脆弱性参考:远程原产BUGTRAQ: 19991221。年代袭击DNS PRO v5.7 WinNT FBLI软件脆弱性参考:XF: dnspro-flood-dos DNS支持允许远程攻击者进行拒绝服务通过大量的连接。修改:ADDREF XF: dnspro-flood-dos推断行动:- 2000 - 0020能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: dnspro-flood-dos = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0024:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:女士:ms99 - 061参考:网址:http://www.microsoft.com/technet/security/bulletin/ms99 - 061. - asp参考:BUGTRAQ: 19991228第三方软件受到IIS漏洞参考“转义字符解析”:BUGTRAQ: 19991229更多信息ms99 - 061 (IIS转义字符脆弱性)参考:XF: iis-badescapes参考:MSKB: Q246401 IIS不合理规范化的url,可能允许远程攻击者绕过访问限制的第三方软件通过转义字符,又名“转义字符解析”的弱点。修改:ADDREF XF: iis-badescapes ADDREF MSKB: Q246401推断行动:- 2000 - 0024能接受(5接受,2 ack, 0评论)目前投票:接受(3)Ozancin,阿姆斯特朗,科尔修改(2)Stracener,法国人评论:Stracener >添加裁判:MSKB: Q246401 Ozancin弗伦奇> > Stracenr的除了XF: iis-badescapes = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0033:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991227 Trend Micro内扫描VirusWall SMTP错误引用:报价:899参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=899参考:XF: interscan-viruswall-bypass内扫描VirusWall SMTP扫描仪不正确的扫描信息与畸形的附件。修改:ADDREF XF: interscan-viruswall-bypass推断行动:- 2000 - 0033能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: interscan-viruswall-bypass = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0042:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991229本地/远程原产。年代袭击CSM邮件服务器的Windows 95 / NT v.2000.08。参考:XF: csm-server-bo参考报价:895参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=895缓冲区溢出的CSM邮件服务器允许远程攻击者造成拒绝服务或通过长直升机命令执行命令。修改:ADDREF XF: csm-server-bo推断行动:- 2000 - 0042能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: csm-server-bo = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0043:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000111分配:20000111类别:科幻参考:BUGTRAQ: 19991230本地/远程缓冲区溢出漏洞在CamShot摄像头HTTP服务器v2.5都/ NT参考:报价:905参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=905参考:XF: camshot-http-get-overflow缓冲区溢出CamShot摄像头HTTP服务器允许远程攻击者执行命令通过一个GET请求。修改:ADDREF XF: camshot-http-get-overflow推断行动:- 2000 - 0043能接受(3接受0 ack, 0评论)目前投票:接受(2)Stracener,阿姆斯特朗修改(1)法国人评论:弗雷希> XF: camshot-http-get-overflow = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0050:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000125分配:20000122类别:科幻参考:阿莱尔:ASB00-01参考:网址:http://www.allaire.com/handlers/index.cfm?ID=13976&Method=Full参考:XF: allaire-webtop-access参考:报价:915参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=915阿莱尔光谱网络桌面允许经过身份验证的用户访问其他网络桌面部分通过指定明确的url。修改:ADDREF XF: allaire-webtop-access推断行动:- 2000 - 0050能接受(4接受,1 ack, 0评论)目前投票:接受(3)布莱克,普罗塞,科尔弗伦奇等待修改(1)(1)Ozancin评论:弗雷希> XF: allaire-webtop-access = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0051:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000125分配:20000122类别:科幻参考:阿莱尔:ASB00-02参考:网址:http://www.allaire.com/handlers/index.cfm?ID=13977&Method=Full参考:报价:916参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=916参考:XF: allaire-spectra-config-dos阿莱尔谱配置向导允许远程攻击者造成拒绝服务通过不断重新提交数据集合索引通过一个URL。修改:ADDREF XF: allaire-spectra-config-dos推断行动:- 2000 - 0051能接受(4接受,1 ack, 0评论)目前投票:接受(3)布莱克,普罗塞,科尔弗伦奇等待修改(1)(1)Ozancin评论:弗雷希> XF: allaire-spectra-config-dos = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0070:最终决定:阶段性裁决:20000418修改:20000418 - 02年提议:20000125分配:20000122类别:科幻参考:BINDVIEW: 20000113当地促销漏洞在Windows NT 4参考:网址:http://www.bindview.com/security/advisory/adv_NtImpersonate.html参考:女士:ms00 - 003参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 003. - asp参考:MSKB: Q247869参考:XF: nt-spoofed-lpc-port参考:网址:http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port参考:报价:934 NtImpersonateClientOfPort本地过程调用Windows NT 4.0允许本地用户获得特权,又名“欺骗LPC的端口的请求。”Modifications: ADDREF XF:nt-spoofed-lpc-port ADDREF BID:934 INFERRED ACTION: CAN-2000-0070 ACCEPT (4 accept, 3 ack, 0 review) Current Votes: ACCEPT(3) Blake, Prosser, Cole MODIFY(1) Frech NOOP(1) Ozancin Comments: Frech> ADDREF XF:nt-spoofed-lpc-port ================================= Candidate: CAN-2000-0112 Published: Final-Decision: Interim-Decision: 20000418 Modified: 20000418-01 Proposed: 20000208 Assigned: 20000208 Category: CF Reference: BUGTRAQ:20000202 vulnerability in Linux Debian default boot configuration Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94973075614088&w=2参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94952030018431&w=2参考:报价:960参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=960参考:XF: debian-mbr-bypass-security默认安装Debian Linux使用一个不安全的主引导记录(MBR),允许本地用户从软盘启动期间安装。修改:ADDREF XF: debian-mbr-bypass-security推断行动:- 2000 - 0112能接受(3接受,1 ack, 0评论)目前投票:接受(2)科尔,普罗塞弗伦奇等待修改(1)(3)墙,Ozancin,布雷克评论:普罗塞弗伦奇> >添加出价934 XF: debian-mbr-bypass-security = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0165:最终决定:阶段性裁决:20000418修改:20000418 - 01提议:20000223分配:20000223类别:科幻参考:BUGTRAQ: 20000210 Re:应用程序代理?参考:FREEBSD: FreeBSD-SA-00:04参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&date=2000 - 02 - 15 - &msg=pine.bsf.4.21.0002192249290.10784 - 100000 @freefall.freebsd.org参考网址:http://www.securityfocus.com/templates/archive.pike?list=1&date=2000 - 02 - 8 &msg=pine.bsf.4.10.10002100058420.43483 - 100000 @hydrant.intranova.net参考:CIAC: k - 023参考:XF: delegate-proxy-bo代表应用程序代理有几个缓冲区溢位允许远程攻击者执行命令。修改:ADDREF CIAC: k - 023 ADDREF XF: delegate-proxy-bo推断行动:- 2000 - 0165能接受(4接受,2 ack, 0评论)目前投票:接受(3)科尔,布莱克,普罗塞弗伦奇等待修改(1)(3)墙,勒布朗,Ozancin评论:弗雷希> XF: delegate-proxy-bo弗雷希>也考虑参考:CIAC: k - 023 = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0181:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000311我们的老朋友防火墙1参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html参考:报价:1054参考:网址:http://www.securityfocus.com/bid/1054防火墙1 3.0和4.0泄漏与私有IP地址信息数据包,这可能允许远程攻击者确定的实际IP地址的主机进行连接。推断行动:- 2000 - 0181能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0184:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000309参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0082.html参考:报价:1037参考:网址:http://www.securityfocus.com/bid/1037Linux printtool设置打印机配置文件的权限是公开,它允许本地攻击者获取打印机共享密码。推断行动:- 2000 - 0184能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0185:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000308 RealServer暴露内部IP地址参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0069.html参考:报价:1049参考:网址:http://www.securityfocus.com/bid/1049RealMedia RealServer揭示了真正的真正的服务器的IP地址,即使地址应该是私有的。推断行动:- 2000 - 0185能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0192:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000304 OpenLinux 2.3: rpm_query参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0029.html参考:报价:1036参考:网址:http://www.securityfocus.com/bid/1036默认安装的破火山口OpenLinux 2.3包括rpm_query CGI程序,它允许远程攻击者确定包是安装在系统上。推断行动:- 2000 - 0192能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0206:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000305 Oracle安装程序问题参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html参考:报价:1035参考:网址:http://www.securityfocus.com/bid/1035安装Oracle 8.1.5。x在Linux上遵循符号链接和创建orainstRoot。sh文件,对外公开权限,允许本地用户获得特权。推断行动:- 2000 - 0206能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0223:最终决定:阶段性裁决:20000418修改:建议:20000322分配:20000322类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20000311咨询都是——wmcdplay参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0107.html参考:报价:1047参考:网址:http://www.securityfocus.com/bid/1047缓冲区溢出的wmcdplay CD播放器程序WindowMaker桌面允许本地用户通过长参数获得根权限。推断行动:- 2000 - 0223能接受(3接受0 ack, 0评论)目前投票:接受(3)布莱克,Ozancin,科尔等待(2)墙,勒布朗

页面最后更新或审查:2007年5月22日,