[日期上一页][下一个日期][线程上一页][线程下][日期索引][线程索引]

[VOTEPRI] 12 5/1/2000高优先级的候选人



以下12个候选人被分配一个优先。他们都是由软件供应商承认。其中一些需要超过一票承兑,所以你的投票将不胜感激。其中最重要的是可以- 1999 - 0210 - 1999 - 0493。CERT活动报告表明这些bug仍然被剥削。注意,也可以- 1999 - 0387最初提出的1999年7月,但不包括任何引用。此后,微软发布了一个安全公告。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。 References help greatly during mapping. 3) Note that a "MODIFY" is treated as an "ACCEPT" when counting votes. So if you don't have sufficient information for a candidate but you don't want to NOOP, use a REVIEWING. ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. KEY FOR INFERRED ACTIONS ------------------------ Inferred actions capture the voting status of a candidate. They may be used by the moderator to determine whether or not a candidate is added to CVE. Where there is disagreement, the moderator must resolve the issue and achieve consensus, or make the final decision if consensus cannot be reached. - ACCEPT = 3 non-MITRE votes to ACCEPT/MODIFY, and no REVIEWING or REJECT - ACCEPT_ACK = 2 non-MITRE ACCEPT/MODIFY, and vendor acknowledgement - MOREVOTES = needs more votes - ACCEPT_REV = 3 non-MITRE ACCEPT's but is delayed due to a REVIEWING - SMC_REJECT = REJECT by Steve Christey; likely to be rejected outright - SMC_REVIEW = REVIEWING by Steve Christey; likely related to CD's - REVIEWING = at least one member is REVIEWING - REJECT = at least one member REJECTed - REVOTE = members should review their vote on this candidate ================================= Candidate: CAN-1999-0031 Published: Final-Decision: Interim-Decision: Modified: Proposed: 19990728 Assigned: 19990607 Category: SF Reference: CERT:CA-97.20.javascript JavaScript allows remote attackers to monitor a user's web activities. INFERRED ACTION: CAN-1999-0031 MOREVOTES-1 (1 accept, 1 ack, 0 review) Current Votes: ACCEPT(1) Wall MODIFY(1) Christey NOOP(1) Northcutt Comments: Christey> The CERT advisory is athttp://www.cert.org/advisories/CA-97.20.javascript.htmlChristey > Christey > ADDREF惠普:hpsbux9707 - 065 Christey >http://www.codetalker.com/advisories/vendor/hp/hpsbux9707 - 065. - htmlChristey > Christey >根据CERT咨询,这个问题影响互联网Christey > Explorer 3。x和4。x,网景2。x, 3。4. x, x。Christey >包含这个描述。投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0124:最终决定:阶段性裁决:修改:建议:19990623分配:19990607类别:科幻参考:CERT: CA-93:11.UMN.UNIX.gopher。脆弱性参考:XF: gopher-vuln漏洞在学院小田鼠和金花鼠+允许入侵者读任何gopher守护进程可以访问的文件。推断行动:- 1999 - 0124 MOREVOTES-1(1接受,1 ack, 0评论)目前投票:弗伦奇等待接受(1)(1)Christey评论:Christey >修改描述,包括版本号Christey > 1.12和2.0 x Christey > Christey >咨询在Christey >http://www.cert.org/advisories/CA-93.11.UMN.UNIX.gopher.vulnerability.htmlChristey >投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0210:最终决定:阶段性裁决:修改:19991130 - 01提议:19990714分配:19990607类别:科幻参考:BUGTRAQ: 19971126 Solaris 2.5.1 automountd利用(fwd)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=88053459921223&w=2参考:BUGTRAQ: 19990103太阳几乎有一个线索!(automountd)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=91547759121289&w=2参考:惠普:hpsbux9910 - 104参考:CERT: ca - 99 - 05加载守护进程automountd允许本地或远程用户获得特权通过shell元字符。修改:修改描述和添加引用。推断行动:- 1999 - 0210 ACCEPT_ACK(2接受,2 ack, 0评论)目前投票:修改(2)Shostack弗雷希无操作(3)Northcutt,墙,Christey评论:Shostack >我认为有一个SNI咨询在这个法国人>没有足够的信息;可能XF: sun-automountd(改变挂载选项)Christey > Christey > SNI没有发布一个顾问;然而,奥利弗·弗里德里希Christey >发送一个帖子说SNI的安全工具测试它。Christey >看到http://marc.theaimsgroup.com/?l=bugtraq&m=91553343311719&w=2Christey > Christey >这是一个艰难的一个。有老加载错误Christey >只有局部可采,然后一个更新的rpc。statd缺陷允许远程Christey >它是可利用的。至少有两个错误,Christey >但应该有三个吗?Christey > Christey >也看到可以- 1999 - 0493投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0387:最终决定:阶段性裁决:修改:19991206 - 01提议:19990728分配:19990607类别:科幻参考:女士:ms99 - 052参考:网址:http://www.microsoft.com/technet/security/bulletin/ms99 - 052. - asp参考:MSKB: Q168115参考:报价:829参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=829遗留凭证缓存机制用于Windows 95, Windows 98系统允许攻击者读取明文网络密码。修改:ADDREF女士:ms99 - 052 ADDREF MSKB: Q168115 ADDREF报价:829年的行动:- 1999 - 0387可以再拨款(0,1)目前投票:回顾(1)弗雷希重新投票(1)Christey评论:弗雷希>术语“遗产”是模糊的,可以解释。弗伦奇>引用需要建立这个漏洞。Christey >添加参考文献。有趣的是,这个候选人是分配Christey > 6月7日,1999年,但没有引用到Christey >微软咨询11月下旬。我失去了Christey >原始参考。投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0491:最终决定:阶段性裁决:修改:20000418 - 02年提议:19990728分配:19990607类别:科幻参考:BUGTRAQ: 19990420 Bash错误引用:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.4.10.9904202114070.6623 - 100000 @smooth.operator.org参考:火山口:综援- 1999 - 008.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 008.0.txt参考:报价:119参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=119提示解析在bash中允许本地用户执行命令作为另一个用户通过创建一个目录,执行命令的名称。修改:CHANGEREF BUGTRAQ[标题]ADDREF火山口:综援- 1999 - 008.0推断行动:- 1999 - 0491 MOREVOTES-1(1接受,1 ack, 0评论)目前投票:弗伦奇等待修改(1)(1)Christey评论:弗雷希> bash-prompt-pars-dir Christey > XF: bash-prompt-pars-dir不存在。Christey > Christey > ADDREF火山口:综援- 1999 - 008.0投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 1999 - 0493:最终决定:阶段性裁决:修改:19991203 - 01提议:19990728分配:19990607类别:科幻参考:CERT: ca - 99 - 05参考:网址:http://www.cert.org/advisories/ca - 99 - 05 - statd automountd.html参考:太阳:00186参考:网址:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba参考:BUGTRAQ: 19990103太阳几乎有一个线索!(automountd)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=91547759121289&w=2rpc。向前statd允许远程攻击者通过SM_MON RPC调用本地操作系统和SM_NOTIFY命令,进而可用于远程利用automountd等缺陷。修改:添加大量引用推断行动:- 1999 - 0493 MOREVOTES-1 (1, 2 ack, 0评论)目前投票:接受(1)Northcutt等待(1)Christey评论:Christey >这个候选人已经修改。投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0076:最终决定:阶段性裁决:修改:建议:20000125分配:20000122类别:科幻参考:BUGTRAQ: 19991230 vibackup。sh参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94709988232618&w=2参考:DEBIAN: 20000109 nvi:不正确的引导脚本参考文件删除:网址:http://www.debian.org/security/2000/20000108nviboot引导脚本在Debian nvi包允许本地用户删除文件通过在vi.recover畸形的条目。推断行动:- 2000 - 0076 MOREVOTES-2 (0, 1 ack, 0评论)目前票:投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0092:最终决定:阶段性裁决:修改:建议:20000208分配:20000202类别:科幻参考:FREEBSD: FreeBSD-SA-00:01参考:网址:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc参考:报价:939参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=939BSD使程序允许本地用户修改文件通过一个符号链接攻击时使用- j选项。推断行动:- 2000 - 0092 MOREVOTES-2 (0, 1 ack, 1审查)目前投票:无操作(1)墙回顾(1)科尔投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0113:最终决定:阶段性裁决:修改:20000419 - 01提议:20000208分配:20000208类别:科幻参考:BUGTRAQ: 20000128 SyGate 3.11端口7323 /远程管理洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94934808714972&w=2参考:BUGTRAQ: 20000202 SV: SyGate 3.11端口7323 /远程管理洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94952641025328&w=2参考:BUGTRAQ: 20000203更新:Sygate 3.11端口7323 Telnet洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=94973281714994&w=2参考:确认:http://www.sybergen.com/support/fix.htm参考:报价:952参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=952SyGate远程管理程序不适当限制其管理服务,它允许远程攻击者导致拒绝服务,或访问网络流量统计。推断行动:- 2000 - 0113 MOREVOTES-1(1接受,1 ack, 0评论)目前投票:接受(1)科尔等待(2)墙,Christey评论:Christey > Sygate证实了这563年01/2000——构建(β)Christey >评论:“修复阻止外部telnet端口7323 Christey >没有增强的安全。”VOTE: ================================= Candidate: CAN-2000-0157 Published: Final-Decision: Interim-Decision: Modified: 20000321-01 Proposed: 20000223 Assigned: 20000223 Category: SF Reference: NETBSD:1999-012 Reference: URL:ftp://ftp.netbsd.org/pub/netbsd/misc/security/advisories/netbsd sa1999 txt.asc——012.参考:XF: netbsd-ptrace NetBSD ptrace呼吁VAX允许本地用户获得特权在调试过程中通过修改PSL内容。修改:ADDREF XF: netbsd-ptrace推断行动:- 2000 - 0157 MOREVOTES-2 (0, 1 ack, 1审查)目前投票:无操作(2)墙,勒布朗回顾(1)科尔投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0229:最终决定:阶段性裁决:修改:20000424 - 01提议:20000412分配:20000412类别:科幻参考:BUGTRAQ: 20000322 gpm-root参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000322182143.4498.qmail@securityfocus.com参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html参考:SUSE: 20000405安全漏洞在流量< 1.18.1参考:网址:http://www.suse.de/de/support/security/suse_security_announce_45.txt参考:REDHAT: RHSA-2000:009-02参考:网址:http://www.redhat.com/support/errata/rhsa - 2000009 - 02. - html参考:报价:1069参考:网址:http://www.securityfocus.com/bid/1069参考:XF: linux-gpm-root gpm-root流量包中不适当的放弃特权,它允许本地用户获得特权,开始从gpm-root效用。修改:ADDREF SUSE: 20000405安全漏洞在流量< 1.18.1 ADDREF REDHAT: RHSA-2000:009-02推断行动:- 2000 - 0229 MOREVOTES-1 (1, 2 ack, 0评论)目前投票:弗伦奇等待接受(1)(1)科尔投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0230:最终决定:阶段性裁决:修改:20000424 - 01提议:20000412分配:20000412类别:科幻参考:BUGTRAQ: 20000316 & c开发咨询——都是imwheel参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html参考:REDHAT: RHSA-2000:016-02参考:网址:http://www.redhat.com/support/errata/rhsa - 2000016 - 02. - html参考:报价:1060参考:网址:http://www.securityfocus.com/bid/1060缓冲区溢出imwheel允许本地用户获得根权限通过imwheel-solo脚本和长家里环境变量。修改:ADDREF REDHAT: RHSA-2000:016-02推断行动:- 2000 - 0230 MOREVOTES-1(1接受,1 ack, 0评论)目前投票:弗伦奇等待修改(1)(1)科尔评论:弗雷希> XF: linux-imwheel-bo投票:

页面最后更新或审查:2007年5月22日,