(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

再保险(建议):集群RECENT-19 - 33的候选人



> - - - - - - - - - - - >从原始信息:史蒂芬·m·Christey [mailto: coley@LINUS.MITRE.ORG]>发送:星期三,2000年6月14日,愚人节点>:cve-editorial-board-list@lists.mitre.org >主题:[计划]集群RECENT-19 - 33候选人> > >未来3 RECENT-XX集群识别共有92名候选人——>最后这几个月非常忙。> >以下集群包含33个候选人,宣布> 4/24/2000和5/10/2000之间。> >中所列出的候选人优先秩序。优先级1和优先级> 2的候选人都应对不同层次的供应商>确认,所以他们应该易于检查和可以信任的>,问题是真实的。> >如果你发现任何RECENT-XX集群与尊重>是不完整的过程中发现的问题相关的时间框架,请>信息发送给我,这样候选人可以转让。> > -史蒂夫> > >总结的选票使用(“严重程度”的按升序)> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > >接受——选民接受候选人提出>等待-选民对候选人没有意见>修改-选民想要改变一些小细节(例如>参考/描述)>回顾-选民正在审查/研究候选人,或>需要更多信息>重塑-候选人必须大幅修改,如>分裂或合并>拒绝候选人不是“漏洞”,或重复等。> > 1)请写你的投票在直线上,从“投票:”开始。如果>你想添加评论或细节,将它们添加到行>后投票:行。> > 2)如果你看到任何失踪的引用,请提及他们,使他们>可以包括在内。在映射引用帮助极大。> > 3)请注意,“修改”被视为一个“接受”当计算选票。 > So if you don't have sufficient information for a candidate but you > don't want to NOOP, use a REVIEWING. > > ********** NOTE ********** NOTE ********** NOTE ********** > NOTE ********** > > Please keep in mind that your vote and comments will be recorded and > publicly viewable in the mailing list archives or in other formats. > > ================================= > Candidate: CAN-2000-0249 > Published: > Final-Decision: > Interim-Decision: > Modified: > Proposed: 20000615 > Assigned: 20000425 > Category: SF > Reference: ISS:20000426 Insecure file handling in IBM AIX > frcactrl program > Reference: URL:http://xforce.iss.net/alerts/advise47.php3> > AIX快速响应缓存加速器(FRCA)允许本地用户>修改>中的任意文件通过配置能力frcactrl程序。> > > ED_PRI - 2000 - 0249 1 > > >投票:修改、添加IBM ERS-OAR-E01-2000:075.1来源,http://www - 1. ibm.com/services/continuity/recover1.nsf/advisories/8525680f006B9445852568CE0055C78A /文件/ oar075美元。txt实际上只是一个重复X-Force公告,但提供了供应商确认。> = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0380 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000426思科HTTP可能的错误:参考:> >网址:http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html>参考:思科:20000514思科IOS HTTP服务器漏洞>参考:>网址:http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml>参考:XF: cisco-ios-http-dos > > IOS HTTP服务在思科路由器和交换机运行IOS 11.1 > 12.1允许远程攻击者造成拒绝服务>请求URL字符串包含% %。> > > ED_PRI - 2000 - 0380 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0382 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:阿莱尔:ASB00-12 >参考:>网址:http://www.allaire.com/handlers/index.cfm?ID=15697&Method=Full>参考:报价:1179 >参考:网址:http://www.securityfocus.com/bid/1179>参考:XF: allaire-clustercats-url-redirect > > ColdFusion ClusterCATS附加的查询字符串参数在HTML重定向URL >,这可能提供敏感信息>网站重定向。> > > ED_PRI - 2000 - 0382 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0387 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:FREEBSD: FreeBSD-SA-00:16 >参考:>网址:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-> SA-00:16.golddig。asc >参考:报价:1184 >参考:网址:http://www.securityfocus.com/bid/1184> >中的makelev程序从FreeBSD golddig游戏端口>集合允许本地用户覆盖任意文件。> > > ED_PRI - 2000 - 0387 1 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0388 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:FREEBSD: FreeBSD-SA-00:17 >参考:>网址:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-> SA-00 a17.libmytinfo % 3。asc >参考:报价:1185 >参考:网址:http://www.securityfocus.com/bid/1185>参考:XF: libmytinfo-bo > >缓冲区溢出在FreeBSD libmytinfo图书馆允许本地用户>执行命令通过一个长TERMCAP环境变量。> > > ED_PRI - 2000 - 0388 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0414 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:惠普:hpsbux0005 - 113 >参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0047.html>参考:XF: hp-shutdown-privileges >参考:报价:1214 >参考:网址:http://www.securityfocus.com/bid/1214> >脆弱性在hp - ux 11关闭命令。X和10。X允许允许>本地用户获得特权通过畸形的输入变量。> > > ED_PRI - 2000 - 0414 1 > > >投票:接受,备注:惠普公告和补丁的另一个链接是@的IT资源中心http://itrc.hp.com> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0433 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:SUSE: 20000502 aaabase参考:< 2000.5.2 > >网址:http://www.suse.de/de/support/security/suse_security_annou> nce_47。txt >参考:XF: aaabase-execute-dot-files > > SuSE aaa_base包安装一些系统账户回家>目录设置为/ tmp,它允许本地用户获得特权>创建标准用户帐户的启动脚本等>概要文件。> > > ED_PRI - 2000 - 0433 1 > > >投票:修改、添加来源:电脑BID1357 SuSE Linux aaabase用户帐户/ tmp家庭脆弱性http://www.securityfocus.com/bid/1357> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0439 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000510 IE域混乱脆弱性>参考:>网址:http://www.securityfocus.com/templates/archive.pike?list=1>味精= 20000511135609. d7774@securityfocus.com >参考:BUGTRAQ: 20000511 IE域混乱脆弱性>是电子邮件问题也>参考:>网址:http://www.securityfocus.com/templates/archive.pike?list=1>味精= NDBBKGHPMKBKDDGLDEEHAEHMDIAA.rms2000@bellatlantic.net >参考:女士:ms00 - 033 >参考:>网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 033. - asp>参考:报价:1194 >参考:网址:http://www.securityfocus.com/bid/1194>参考:XF: ie-cookie-disclosure > > Internet Explorer 4.0和5.0允许恶意网站获得>客户端从另一个领域,包括域名和饼干>逃脱字符在一个URL,又名“饼干的未经授权的访问”>脆弱性。> > > ED_PRI - 2000 - 0439 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0440 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:NETBSD: NETBSD - sa2000 - 002 >参考:>网址:ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/N> etbsd - sa2000 - 002. - txt。(NHC20000504a asc >参考:BUGTRAQ: 20000506。0:NetBSD恐慌>当发送对齐IP选项]>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html>参考:报价:1173 >参考:网址:http://www.securityfocus.com/bid/1173> > NetBSD 1.4.2早些时候,允许远程攻击者导致拒绝>服务通过发送一个包和一个对齐的IP时间戳选项。> > > ED_PRI - 2000 - 0440 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0457 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000511警报:IIS ism。dll公开文件内容>参考:URL >:http://marc.theaimsgroup.com/?l=bugtraq&m=95810120719608&w=2>参考:女士:ms00 - 031 >参考:>网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 031. - asp>参考:报价:1193 >参考:网址:http://www.securityfocus.com/bid/1193> >的奇闻怪谈。DLL在IIS 4.0和5.0允许远程攻击者读取文件>内容通过请求该文件并添加大量>编码空间(% 20)和终止.htr扩展,又名>”。HTR文件片段阅读”或“文件片段阅读通过.HTR " >脆弱性。> > > ED_PRI - 2000 - 0457 1 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0379 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000507咨询:Netopia R9100路由器>脆弱性>参考:>http://www.securityfocus.com/templates/archive.pike?list=1&msg> = 200005082054. naa32590@linux.mtndew.com >参考:>确认:http://www.netopia.com/equipment/purchase/fmw_update.html>参考:报价:1177 >参考:网址:http://www.securityfocus.com/bid/1177>参考:XF: netopia-snmp-comm-strings > > Netopia R9100路由器并不阻止通过身份验证的用户>修改SNMP表,即使管理员配置它>。> > > ED_PRI - 2000 - 0379 2 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0427 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:未知>参考:L0PHT: 20000504 eToken私人信息>提取和物理攻击>参考:网址:http://www.l0pht.com/advisories/etoken-piepa.txt>参考:XF: aladdin-etoken-pin-reset >参考:报价:1170 >参考:网址:http://www.securityfocus.com/bid/1170> > >的阿拉丁知识系统eToken设备允许攻击者对该设备的物理访问来获取敏感信息没有>知道主人的销重置eepm销。> > > ED_PRI - 2000 - 0427 2 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0428 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:奈:20000503 Trend Micro内扫描远程溢出VirusWall > >参考:>网址:http://www.nai.com/nai_labs/asp_set/advisory/39_Trend.asp>参考:报价:1168 >参考:网址:http://www.securityfocus.com/bid/1168>参考:XF: interscan-viruswall-bo > >缓冲区溢出的SMTP网关内扫描病毒墙早3.32和>允许远程攻击者执行任意命令通过一种编码的程式附件>长文件名。> > > ED_PRI - 2000 - 0428 2 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0378 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000502 pam_console虫>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0023.html>参考:报价:1176 >参考:网址:http://www.securityfocus.com/bid/1176> > pam_console PAM模块在Linux系统上执行一个乔恩>各种设备在一个用户登录,但有些设备>的所有权不是重置用户注销时,该用户可以嗅>活动在这些设备后续用户登录。> > > ED_PRI - 2000 - 0378 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0381 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000505黑色手表实验室脆弱性预警>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0067.html>参考:http://www.perfectotech.com/blackwatchlabs/vul5_05.html> MISC: >参考:XF: http-cgi-dbman-db >参考:报价:1178 >参考:网址:http://www.securityfocus.com/bid/1178> > DBMan db轻飘飘的线程。cgi cgi脚本允许远程攻击者>查看和设置环境变量信息通过引用>不存在数据库的db参数。> > > ED_PRI - 2000 - 0381 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0383 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:XF: aolim-file-path >参考:BugTraq邮件列表:“美国在线即时通讯”:>参考:>http://www.securityfocus.com/templates/archive.pike?list=1&msg> = 002401 bfb918 d5a0 7310美元1 ef084ce@karemor.com >参考:报价:1180 >参考:网址:http://www.securityfocus.com/bid/1180> > AOL的即时通讯的文件传输组件(AIM)揭示了>物理路径的文件传输到远程接收方。> > > ED_PRI - 2000 - 0383 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0384 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:CF >参考:L0PHT: 7180 NetStructure 20000508远程后门漏洞> >参考:网址:http://www.lopht.com/advisories/ipivot7110.html>参考:L0PHT: 20000508 7110年NetStructure控制台后门>参考:网址:http://www.l0pht.com/advisories/ipivot7180.html>参考:确认:http://216.188.41.136/>参考:XF: netstructure-root-compromise >参考:XF: netstructure-wizard-mode >参考:报价:1182 >参考:网址:http://www.securityfocus.com/bid/1182>参考:报价:1183 >参考:网址:http://www.securityfocus.com/bid/11837110年和7180年> > NetStructure非法账户(servnow、根、>和向导)的密码很容易猜测> NetStructure的MAC地址,这可能允许远程攻击者获得>根访问。> > > ED_PRI - 2000 - 0384 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0385 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:> MISC:http://www.blueworld.com/blueworld/万博下载包news/05.01.00-FM5_Secu>财务自由。html >参考:确认:http://www.filemaker.com/support/webcompanion.html>参考:XF: macos-filemaker-xml >参考:XF: macos-filemaker-email > > FileMaker Pro 5 Web同伴允许远程攻击者绕过通过XML发布> >字段级数据库安全限制或电子邮件功能。> > > ED_PRI - 2000 - 0385 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0386 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:> MISC:http://www.blueworld.com/blueworld/万博下载包news/05.01.00-FM5_Secu>财务自由。html >参考:确认:http://www.filemaker.com/support/webcompanion.html>参考:XF: macos-filemaker-anonymous-email > > FileMaker Pro 5 Web同伴允许远程攻击者发送>匿名的或伪造的电子邮件。> > > ED_PRI - 2000 - 0386 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0409 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000510可能的符号链接问题> Netscape 4.73 >参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0126.html>参考:报价:1201 >参考:网址:http://www.securityfocus.com/bid/1201>参考:XF: netscape-import-certificate-symlink > > Netscape 4.73和更早的是符号链接时进口new >证书,它允许本地用户覆盖用户的文件>导入证书。> > > ED_PRI - 2000 - 0409 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0410 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:NTBUGTRAQ: 20000510冷聚变服务器4.5.1 DoS >脆弱性。>参考:URL >:http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind00> 5 l = ntbugtraq&F =郑清奎= = 4843 >代替参考:XF: coldfusion-cfcache-dos >参考:报价:1192 >参考:网址:http://www.securityfocus.com/bid/1192> >冷聚变服务器4.5.1允许远程攻击者导致拒绝>服务通过重复请求一个CFCACHE标记缓存文件>这不是存储在内存中。> > > ED_PRI - 2000 - 0410 3 > > >投票:修改添加安全BugWare来源http://161.53.42.3/的crv /安全/错误/ NT / cf12.html> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0411 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000510黑色手表实验室脆弱性预警>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0125.html参考:> > MISC:http://www.perfectotech.com/blackwatchlabs/vul5_10.html>参考:XF: http-cgi-formmail-environment >参考:报价:1187 >参考:网址:http://www.securityfocus.com/bid/1187> >马特·赖特的FormMail CGI脚本允许远程攻击者获得通过env_report >环境变量参数。> > > ED_PRI - 2000 - 0411 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0412 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000510 KNapster脆弱性>妥协User-readable文件>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html> >参考:BUGTRAQ: 20000510 Gnapster漏洞妥协User-readable文件>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html>参考:FREEBSD: FreeBSD-SA-00:18 >参考:>网址:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-> SA-00:18-gnapster。副词>参考:XF: gnapster-view-files >参考:报价:1186 >参考:网址:http://www.securityfocus.com/bid/1186> > gnapster和knapster客户Napster不适当限制>访问MP3文件,它允许远程攻击者从客户端读取任意文件> >文件通过指定完整的路径名。> > > ED_PRI - 2000 - 0412 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0413 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000506 shtml。exe揭示本地路径> IIS web目录>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0084.html>参考:报价:1174 >参考:网址:http://www.securityfocus.com/bid/1174>参考:XF: iis-shtml-reveal-path shtml > >。exe程序首页扩展包的IIS 4.0 > 5.0允许远程攻击者的物理路径> HTML, HTM, ASP的,和SHTML文件通过请求>不存在的文件,生成一个错误消息,揭示了路径。> > > ED_PRI - 2000 - 0413 3 > > >投票:修改安全BugWare额外的来源http://161.53.42.3/的crv /安全/错误/ NT / fpse10.html评论页re:“女士即将发布的服务版本OSR 1.2需要改变。”I haven't located anything on MS site yet. Anyone help? > ================================= > Candidate: CAN-2000-0417 > Published: > Final-Decision: > Interim-Decision: > Modified: > Proposed: 20000615 > Assigned: 20000614 > Category: SF > Reference: BUGTRAQ:20000505 Cayman 3220-H DSL Router DOS > Reference: > URL:http://archives.neohapsis.com/archives/bugtraq/2000-05/0075.html>参考:BUGTRAQ: 20000523开曼群岛3220 h DSL路由器软件>更新和新的奖金攻击>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0280.html>参考:报价:1219 >参考:网址:http://www.securityfocus.com/bid/1219> > HTTP管理界面开曼3220 - h DSL路由器>允许远程攻击者造成拒绝服务通过一个长>用户名或密码。> > > ED_PRI - 2000 - 0417 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0422 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000504警报:DMailWeb缓冲区溢出>参考:>网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95749276827558&w=2>参考:XF: http-cgi-dmailweb-bo >参考:报价:1171 >参考:网址:http://www.securityfocus.com/bid/1171> >缓冲区溢出在Netwin DMailWeb CGI程序允许远程攻击者通过长utoken >执行任意命令参数。> > > ED_PRI - 2000 - 0422 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0423 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000505警报:DNewsWeb缓冲区溢出>参考:>网址:万博下载包http://marc.theaimsgroup.com/?l=bugtraq&m=95764950403250&w=2>参考:XF: http-cgi-dnews-bo 万博下载包>参考:报价:1172 >参考:网址:http://www.securityfocus.com/bid/1172> >缓冲区溢出在Netwin DNEWSWEB CGI程序允万博下载包许远程攻击者>执行任意命令通过长等参数组,cmd, >和utag。> > > ED_PRI - 2000 - 0423 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0425 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:>确认:http://www.lsoft.com/万博下载包news/default.asp?item=Advisory0>参考:BUGTRAQ: 20000505警报:其实Web档案(wa) >缓冲区溢出>参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html>参考:XF: http-cgi-listserv-wa-bo >参考:报价:1167 >参考:网址:http://www.securityfocus.com/bid/1167> > Web档案组件的缓冲区溢出L-Soft LISTSERV 1.8 >允许远程攻击者执行任意命令。> > > ED_PRI - 2000 - 0425 3 > > >投票:修改、添加来源:Lsoft安全顾问5,2000年5月http://www.lsoft.com/万博下载包news/Advisory0.asp> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0426 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000505 Re:玩UltraBoard V1.6X >参考:>网址:http://archives.neohapsis.com/archives/bugtraq/2000-05/0059.html>参考:报价:1175 >参考:网址:http://www.securityfocus.com/bid/1175>参考:XF: ultraboard-cgi-dos > > UltraBoard 1.6和其他版本允许远程攻击者造成>引用UltraBoard拒绝服务的会话参数>导致UltraBoard叉本身的副本。> > > ED_PRI - 2000 - 0426 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0429 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000427警报:Cart32密码>后门(CISADV000427) >参考:>网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95686068203138&w=2>参考:确认:http://www.cart32.com/kbshow.asp?article=c048> >早些时候在Cart32 3.0和后门密码允许远程攻击者>执行任意命令。> > > ED_PRI - 2000 - 0429 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0430 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000503 >引用另一个有趣的Cart32命令:>网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95738697301956&w=2>参考:XF: cart32-expdate > > Cart32允许远程攻击者访问敏感调试> / expdate附加到URL请求的信息。> > > ED_PRI - 2000 - 0430 3 > > >投票:接受> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0458 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000424两个小鬼2 >参考问题:>网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95672120116627&w=2>参考:XF: imp-tmpfile-view MSWordView应用程序> > >的IMP创建全局文件/ tmp目录,它允许其他本地用户阅读可能>敏感信息。> > > ED_PRI - 2000 - 0458 3 > > >投票:等待> > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >候选人:- 2000 - 0459 >发表:>最终决定:>阶段性裁决::>修改>提出:20000615 >分配:20000614 >类别:科幻小说>参考:BUGTRAQ: 20000424两个小鬼2 >参考问题:>网址:http://marc.theaimsgroup.com/?l=bugtraq&m=95672120116627&w=2>参考:XF: imp-wordfile-dos > >小鬼不正确如果MSWordView应用程序>退出删除文件,它允许本地用户造成拒绝服务由>填满磁盘空间要求大量的文档>和过早停止请求。> > > ED_PRI - 2000 - 0459 3 > > >投票:等待>

应用程序/ ms-tnef


页面最后更新或审查:2007年5月22日,