(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群商- 15的候选人



下面的集群包含15个候选人宣布4月13日至4月25日,2000年。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。如果你发现任何RECENT-XX集群是不完整的对过程中发现的问题相关的时间框架,请发送信息给我,这样候选人可以被指定。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ================================= Candidate: CAN-2000-0311 Published: Final-Decision: Interim-Decision: Modified: Proposed: 20000518 Assigned: 20000511 Category: SF Reference: MS:MS00-026 Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00 - 026. - asp参考:报价:1145参考:网址:http://www.securityfocus.com/bid/1145Windows 2000域控制器允许恶意用户修改Active Directory信息通过修改一个不受保护的属性,又名“混合对象访问”的弱点。ED_PRI - 2000 - 0311 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0331:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000421 CMD。EXE溢出(CISADV000420)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0147.html参考:女士:ms00 - 027参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 027. - asp参考:报价:1135参考:网址:http://www.securityfocus.com/bid/1135缓冲区溢出在微软命令处理器(用于cmd . exe) Windows NT和Windows 2000允许本地用户造成拒绝服务通过一个环境变量,又名“畸形的环境变量”的弱点。ED_PRI - 2000 - 0331 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0334:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:阿莱尔:ASB00-10参考:网址:http://www.allaire.com/handlers/index.cfm?ID=15411&Method=Full阿莱尔光谱容器编辑预览工具不正确执行对象安全性,攻击者可以通过对象方法进行未经授权的活动,被添加到容器对象发布规则。ED_PRI - 2000 - 0334 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0336:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:REDHAT: RHSA-2000:012-05参考:网址:http://www.redhat.com/support/errata/rhsa - 2000012 - 05. - html在Red Hat Linux OpenLDAP服务器允许本地用户修改任意文件通过一个符号链接攻击。ED_PRI - 2000 - 0336 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0317:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424 Solaris 7 x86 lpset利用。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0192.html参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0236.html参考:BUGTRAQ: 20000427 Re: Solaris / SPARC 2.7 lpset利用(不可能!)参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95729763119559&w=2参考:SUNBUG: 4334568参考:报价:1138参考:网址:http://www.securityfocus.com/bid/1138缓冲区溢位Solaris 7 lpset允许本地用户获得根权限通过长- r选项。ED_PRI - 2000 - 0317 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0316:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424 x86 lp利用参考Solaris 7:网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0191.html参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0236.html参考:报价:1143参考:网址:http://www.securityfocus.com/bid/1143缓冲区溢位Solaris 7 lp允许本地用户获得根权限通过长- d选项。ED_PRI - 2000 - 0316 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0318:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:NTBUGTRAQ: 20000413安全问题与心房Mercur服务器3.20参考:网址:http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0057.html参考:报价:1144参考:网址:http://www.securityfocus.com/bid/1144心房Mercur邮件服务器3.2允许本地攻击者读取其他用户的电子邮件和通过点点创建任意文件(. .)攻击。ED_PRI - 2000 - 0318 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0319:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424不安全fgets()发送邮件的邮件。本地引用:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=2694.000424@SECURITY.NNOV.RU参考:报价:1146参考:网址:http://www.securityfocus.com/bid/1146邮件。当地在Sendmail 8.10。x不正确识别。\ n字符串标识消息文本,它允许远程攻击者造成拒绝服务或腐败的邮箱通过消息2047个字符长,以线。\ n。ED_PRI - 2000 - 0319 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0320:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000421不安全fgets () qpopper参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421@SECURITY.NNOV.RU参考:报价:1133参考:网址:http://www.securityfocus.com/bid/1133Qpopper 2.53和3.0不正确识别\ n弦标识消息文本,它允许远程攻击者造成拒绝服务或腐败的邮箱通过消息行1023个字符长,以\ n。ED_PRI - 2000 - 0320 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0321:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424 .14点参考版本中缓冲区溢出:网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0190.html参考:报价:1147参考:网址:http://www.securityfocus.com/bid/1147缓冲区溢出在IC半径包允许远程攻击者造成拒绝服务通过用户名。ED_PRI - 2000 - 0321 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0322:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424食人鱼默认密码/利用参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=enip.bso.23.0004241601140.28851 - 100000 @www.whitehats.com参考:报价:1149参考:网址:http://www.securityfocus.com/bid/1149passwd。php3 CGI脚本在Red Hat食人鱼虚拟服务器包允许本地用户execure任意命令通过shell元字符。ED_PRI - 2000 - 0322 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0324:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000425对pcAnywhere拒绝服务。参考网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.3.96.1000425150157.13567a - 100000 @sword.damocles.com参考:报价:1150参考:网址:http://www.securityfocus.com/bid/1150pcAnywhere 8。x和9。x允许远程攻击者通过TCP SYN扫描引起拒绝服务,例如nmap。ED_PRI - 2000 - 0324 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0326:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:报价:1151参考:网址:http://www.securityfocus.com/bid/1151参考:确认:http://support.on.com/support/mmxp.nsf/31af51e08bcc93eb852565a90056138b/11af70407a16b165852568c50056a952?OpenDocument会议制造商使用弱加密密码(一个多字码替换密码),它允许远程攻击者嗅嗅和会议公司账户密码进行解密。ED_PRI - 2000 - 0326 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0337:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000424 Solaris x86 Xsun溢出。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0188.html参考:报价:1140参考:网址:http://www.securityfocus.com/bid/1140缓冲区溢出Xsun X服务器在Solaris 7允许本地用户通过长- dev参数获得根权限。ED_PRI - 2000 - 0337 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0338:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:报价:1136参考:网址:http://www.securityfocus.com/bid/1136并发版本软件(CVS)使用可预测的临时文件名称锁定,它允许本地用户通过创建锁导致拒绝服务目录之前创建一个合法使用CVS用户。ED_PRI - 2000 - 0338 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0339:最终决定:阶段性裁决:修改:建议:20000518分配:20000511类别:科幻参考:BUGTRAQ: 20000420 ZoneAlarm参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail@securityfocus.com参考:报价:1137参考:网址:http://www.securityfocus.com/bid/1137ZoneAlarm 2.1.10早些时候,不过滤UDP数据包的源端口67,它允许远程攻击者绕过防火墙规则。ED_PRI - 2000 - 0339 3投票:

页面最后更新或审查:2007年5月22日,