(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群linux - 99 - 26遗留的候选人



下面的集群包含26个候选人,都是记录在至少一个顾问,于1999年发布的Linux供应商。大多数候选人都有一个“优先1”,因为它们由供应商确认。其他优先级3因为它们影响内容决定。有几个1999报告尚未覆盖的候选人。他们仍在幕后工作。在某些情况下,咨询太抽象,没有足够的信息来判断它是否与现有的相关问题。其他相关报告各种软件包有很多漏洞在很短的时间内,所以它需要深入的分析韦德通过沼泽和确保没有重复与现有的候选人(wu-ftpd / ProFTPD就是一个例子)。CVE内容团队的成员正在进行深入的分析,以及准备下一轮的遗产候选人从所有董事会成员(和一些堂而皇之的成员)为此贡献他们的漏洞数据库。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。 2) If you see any missing references, please mention them so that they can be included. References help greatly during mapping. 3) Note that a "MODIFY" is treated as an "ACCEPT" when counting votes. So if you don't have sufficient information for a candidate but you don't want to NOOP, use a REVIEWING. ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ================================= Candidate: CAN-2000-0352 Published: Final-Decision: Interim-Decision: Modified: Proposed: 20000524 Assigned: 20000523 Category: SF Reference: BUGTRAQ:19991117 Pine: expanding env vars in URLs (seems to be fixed as of 4.21) Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=pine.lnx.4.10.9911171818220.12375 - 100000 @ray.compu aid.com参考:火山口:综援- 1999 - 036.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 036.0.txt参考:SUSE: 19991227安全漏洞在松树< 4.21参考:网址:http://www.suse.de/de/support/security/suse_security_announce_36.txt参考:报价:810参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=810松前4.21版本不正确过滤shell元字符的URL,它允许远程攻击者执行任意命令通过一个畸形的URL。ED_PRI - 2000 - 0352 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0353:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:MISC:http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html参考:SUSE: 19990628松4中执行的命令。x参考:网址:http://www.suse.de/de/support/security/suse_security_announce_6.txt参考:SUSE: 19990911更新松(固定IMAP支持)参考资料:网址:http://www.suse.de/de/support/security/pine_update_announcement.txt松4。x允许远程攻击者通过索引执行任意命令。html文件执行猞猁和获得一个uudecoded文件从一个恶意的web服务器,然后执行的松树。ED_PRI - 2000 - 0353 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0354:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:BUGTRAQ: 19990928镜子2.9孔参考:网址:http://www.securityfocus.com/templates/archive.pike?list=1&msg=15769.990928@tomcat.ru参考:DEBIAN: 19991018错误的目录名称处理在镜子参考:网址:http://www.debian.org/security/1999/19991018参考:SUSE: 19991001安全漏洞在镜子参考:网址:http://www.suse.de/de/support/security/suse_security_announce_22.txt参考:报价:681参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=6812.8参考:XF: mirror-perl-remote-file-creation镜子。x在Linux系统允许远程攻击者创建文件一个级别高于当地的目标目录。ED_PRI - 2000 - 0354 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0356:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:REDHAT: RHSA-1999:040参考:网址:http://www.securityfocus.com/templates/advisory.html?id=1789参考:XF: linux-pam-nis-login参考:报价:697参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=697可插入的身份验证模块(PAM)在Red Hat Linux 6.1不正确锁禁用NIS账户的访问权限。ED_PRI - 2000 - 0356 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0359:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:BUGTRAQ: 19991113 thttpd 2.04堆栈溢出(VD # 6)参考:网址:http://archives.neohapsis.com/archives/bugtraq/1626.html参考:SUSE: 19991116安全漏洞thttpd 1.90 - 2.04参考:网址:http://www.suse.de/de/support/security/suse_security_announce_30.txt缓冲区溢出在琐碎的HTTP (THTTPd)允许远程攻击者造成拒绝服务或执行任意命令通过一个if - modified - since头。ED_PRI - 2000 - 0359 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0360:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:SUSE: 19991124安全漏洞在旅店< = 2.2.1参考:网址:http://www.suse.de/de/support/security/suse_security_announce_34.txt参考:火山口:综援- 1999 - 038.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 038.0.txt早些时候在客栈2.2.1和缓冲区溢出允许远程攻击者通过恶意导致拒绝服务格式的文章。ED_PRI - 2000 - 0360 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0361:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:SUSE: 19991214安全漏洞在wvdial < = 1.4参考:网址:http://www.suse.de/de/support/security/suse_security_announce_35.txtPPP wvdial。lxdialog早些时候在wvdial 1.4和脚本创建一个. config文件与世界可读权限,dialout组的本地攻击者可以访问登录和密码信息。ED_PRI - 2000 - 0361 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0362:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:SUSE: 19991019安全漏洞在cdwtools < 093参考:网址:http://www.suse.de/de/support/security/suse_security_announce_25.txt参考:报价:738参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=738在093年Linux cdwtools缓冲区溢出,早些时候允许本地用户获得根权限。ED_PRI - 2000 - 0362 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0363:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:SUSE: 19991019安全漏洞在cdwtools < 093参考:网址:http://www.suse.de/de/support/security/suse_security_announce_25.txt参考:报价:738参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=738Linux cdwtools 093年早些时候,允许本地用户获得根权限通过/ tmp目录。ED_PRI - 2000 - 0363 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0366:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:DEBIAN: 19991202问题恢复符号链接参考:网址:http://www.debian.org/security/1999/19991202倾倒在Debian Linux 2.1不正确恢复符号链接,它允许本地用户修改任意文件的所有权。ED_PRI - 2000 - 0366 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0367:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:DEBIAN: 19990218根利用eterm参考:网址:http://www.debian.org/security/1999/19990218参考:XF: linux-eterm脆弱性eterm 0.8.8在Debian Linux允许攻击者获得根权限。ED_PRI - 2000 - 0367 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0369:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 029.1参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 029.1.txt在火山口识别服务器的Linux 2.3为每个识别请求创建多个线程,它允许远程攻击者造成拒绝服务。ED_PRI - 2000 - 0369 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0370:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 001.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 001.0.txtdebug选项在火山口Linux简讯邮件允许远程攻击者通过shell元字符执行命令的- d选项rmail命令。ED_PRI - 2000 - 0370 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0371:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 005.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 005.0.txt参考:XF: kde-mediatool libmediatool库用于KDE mediatool允许本地用户创建任意文件通过一个符号链接攻击。ED_PRI - 2000 - 0371 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0372:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 014.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 014.0.txt参考:XF: linux-rmt参考:网址:http://xforce.iss.net/static/2268.php脆弱性在火山口rmt在转储命令包0.4 b4允许本地用户获得根权限。ED_PRI - 2000 - 0372 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0373:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 015.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 015.0.txt参考:REDHAT: RHSA-1999:015-01参考:网址:http://www.redhat.com/support/errata/RHSA1999015_01.html参考:XF: kde-kvt参考:网址:http://xforce.iss.net/static/2266.php在KDE kvt终端程序漏洞允许本地用户获得根权限。ED_PRI - 2000 - 0373 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0374:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:火山口:综援- 1999 - 021.0参考:网址:ftp://ftp.calderasystems.com/pub/openlinux/security/cssa - 1999 021.0.txt股在火山口的默认配置Linux允许从任何主机XDMCP连接,允许远程攻击者获取敏感信息或绕过额外的访问限制。ED_PRI - 2000 - 0374 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0355:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:SUSE: 19990920安全漏洞在pbpg参考:网址:http://www.suse.de/de/support/security/suse_security_announce_21.txt参考:XF: linux-pb-fileread参考:XF: linux-pg-fileread pg和SuSE pbpg 1 pb。x包允许攻击者读取任意文件。ED_PRI - 2000 - 0355 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0357:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:REDHAT: RHSA-1999:058-01参考:网址:http://www.redhat.com/corp/support/errata/rhsa1999058 - 01. - html轨道,esound Red Hat Linux 6.1中不使用足够的随机数,它允许本地用户想认证密钥。ED_PRI - 2000 - 0357 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0358:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:REDHAT: RHSA-1999:058-01参考:网址:http://www.redhat.com/corp/support/errata/rhsa1999058 - 01. - html轨道和gnome-session Red Hat Linux 6.1允许远程攻击者一个程序崩溃。ED_PRI - 2000 - 0358 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0364:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:科幻参考:BUGTRAQ: 19990606 6.0 RedHat, /dev/pts权限错误当使用xterm参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=92877527701347&w=2参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=92886009012161&w=2参考:REDHAT: RHSA1999014_01参考:网址:http://www.redhat.com/corp/support/errata/RHSA1999014_01.html参考:报价:309参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=309在Red Hat Linux 6.0屏幕,rxvt tty设备的不正确设置模式,它允许本地用户写其他tty。ED_PRI - 2000 - 0364 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0365:最终决定:阶段性裁决:修改:建议:20000524分配:20000523类别:CF参考:BUGTRAQ: 19990606 6.0 RedHat, /dev/pts权限错误当使用xterm参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=92877527701347&w=2参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=92886009012161&w=2参考:REDHAT: RHSA1999014_01参考:网址:http://www.redhat.com/corp/support/errata/RHSA1999014_01.html参考:报价:308参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=308Red Hat Linux 6.0安装/dev/pts文件系统与不安全的模式,它允许本地用户写其他tty设备。ED_PRI - 2000 - 0365 3投票:

页面最后更新或审查:2007年5月22日,