(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群近三十- 17的候选人



下面的集群包含17个候选人宣布7/21/2000和7/27/2000之间。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。如果你发现任何RECENT-XX集群是不完整的对过程中发现的问题相关的时间框架,请发送信息给我,这样候选人可以被指定。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ================================= Candidate: CAN-2000-0621 Published: Final-Decision: Interim-Decision: Modified: Proposed: 20000803 Assigned: 20000726 Category: SF Reference: MS:MS00-046 Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00 - 046. - asp参考:CERT: ca - 2000 - 14参考:网址:http://www.cert.org/advisories/ca - 2000 - 14. - html参考:报价:1501参考:网址:http://www.securityfocus.com/bid/1501Microsoft Outlook 98年和2000年,Outlook Express 4.0倍和5.0倍,允许远程攻击者读取客户机的文件系统通过一个畸形的HTML消息存储文件缓存之外,又名“缓存搭桥”的弱点。ED_PRI - 2000 - 0621 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0655:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000724 JPEG COM标记处理漏洞在网景浏览器参考:网址:http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D200007242356.DAA01274%40false.com参考:REDHAT: RHSA-2000:046-02参考:网址:http://www.redhat.com/support/errata/rhsa - 2000 - 046 - 02. - html参考:报价:1503参考:网址:http://www.securityfocus.com/bid/1503Netscape 4.73和更早的沟通者允许远程攻击者造成拒绝服务或执行任意命令通过一个JPEG图像包含注释的非法字段长度1。ED_PRI - 2000 - 0655 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0663:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:女士:ms00 - 052参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 052. - asp参考:MSKB: Q269049参考:网址:http://www.microsoft.com/technet/support/kb.asp?ID=269049参考:报价:1507参考:网址:http://www.securityfocus.com/bid/1507Windows的注册表项壳可执行(资源管理器)在Windows NT和Windows 2000使用相对路径名称,本地用户可以执行任意命令插入一个特洛伊木马探险家命名。exe % Systemdrive %目录,即“相对外壳路径”的漏洞。ED_PRI - 2000 - 0663 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0668:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:REDHAT: RHSA-2000:044-02参考:网址:http://www.redhat.com/support/errata/rhsa - 2000 - 044 - 02. - html参考:报价:1513参考:网址:http://www.securityfocus.com/bid/1513pam_console PAM模块在Linux系统允许用户访问系统控制台和重新启动系统时显示经理如gdm或kdm XDMCP启用。ED_PRI - 2000 - 0668 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0673:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:奈:20000727 Windows NetBIOS名称冲突参考:女士:ms00 - 047参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 047. - asp参考:报价:1514参考:网址:http://www.securityfocus.com/bid/1514参考:报价:1515参考:网址:http://www.securityfocus.com/bid/1515NetBIOS名称服务器(nbn公司禁止)协议不执行身份验证,它允许远程攻击者造成拒绝服务通过发送一个欺骗名称冲突或名称发布数据报,又名“NetBIOS名称服务器协议欺骗”的弱点。ED_PRI - 2000 - 0673 1投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0664:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000726 AnalogX“SimpleServer: WWW”点点错误引用:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0374.html参考:确认:http://www.analogx.com/contents/download/network/sswww.htm参考:报价:1508参考:网址:http://www.securityfocus.com/bid/1508AnalogX SimpleServer: WWW 1.06和更早的允许远程攻击者读取任意文件通过修改. .(点点)攻击,使用% 2 e URL编码的点。ED_PRI - 2000 - 0664 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0671:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 Roxen安全警报:url包含空字符的问题。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0321.html参考:BUGTRAQ: 20000721 Roxen Web服务器漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0307.html参考:报价:1510参考:网址:http://www.securityfocus.com/bid/1510Roxen web服务器比2.0.69允许允许远程攻击者列出目录内容和阅读源代码通过添加一个空字符(% 00)的URL。ED_PRI - 2000 - 0671 2投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0644:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 WFTPD / WFTPD Pro 2.41 RC11漏洞。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0295.html参考:报价:1506参考:网址:http://www.securityfocus.com/bid/1506WFTPD和WFTPD Pro 2.41允许远程攻击者造成拒绝服务通过执行STAT命令在命令列表仍执行。ED_PRI - 2000 - 0644 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0645:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 WFTPD / WFTPD Pro 2.41 RC11漏洞。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0295.html参考:报价:1506参考:网址:http://www.securityfocus.com/bid/1506WFTPD和WFTPD Pro 2.41允许远程攻击者造成拒绝服务通过重启(REST)命令和写作以外的文件,或写入一个文件不存在,通过命令,如商店独特的(STOU),存储(大的),或添加(APPE)。ED_PRI - 2000 - 0645 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0646:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 WFTPD / WFTPD Pro 2.41 RC11漏洞。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0295.html参考:报价:1506参考:网址:http://www.securityfocus.com/bid/1506WFTPD和WFTPD Pro 2.41允许远程攻击者获得一个文件的实际路径名通过执行状态(STAT)命令文件时转移。ED_PRI - 2000 - 0646 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0647:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 WFTPD / WFTPD Pro 2.41 RC11漏洞。参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0295.html参考:报价:1506参考:网址:http://www.securityfocus.com/bid/1506WFTPD和WFTPD Pro 2.41允许远程攻击者造成拒绝服务通过执行一个MLST命令登录到服务器之前。ED_PRI - 2000 - 0647 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0652:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000723 IBM WebSphere默认servlet处理程序showcode脆弱性参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0342.html参考:报价:1500参考:网址:http://www.securityfocus.com/bid/1500IBM WebSphere允许远程攻击者读取源代码执行web文件通过直接调用默认InvokerServlet使用URL包含“/ servlet /文件”字符串。ED_PRI - 2000 - 0652 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0656:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000724 AnalogX代理DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0360.html参考:确认:http://www.analogx.com/contents/download/network/proxy.htm参考:报价:1504参考:网址:http://www.securityfocus.com/bid/1504早些时候在AnalogX代理服务器4.04和缓冲区溢出允许远程攻击者造成拒绝服务通过一个长用户命令在FTP协议。ED_PRI - 2000 - 0656 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0657:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000724 AnalogX代理DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0360.html参考:确认:http://www.analogx.com/contents/download/network/proxy.htm参考:报价:1504参考:网址:http://www.securityfocus.com/bid/1504早些时候在AnalogX代理服务器4.04和缓冲区溢出允许远程攻击者通过长直升机命令导致拒绝服务的SMTP协议。ED_PRI - 2000 - 0657 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0658:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000724 AnalogX代理DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0360.html参考:确认:http://www.analogx.com/contents/download/network/proxy.htm参考:报价:1504参考:网址:http://www.securityfocus.com/bid/1504早些时候在AnalogX代理服务器4.04和缓冲区溢出允许远程攻击者造成拒绝服务通过一个长POP3协议的用户命令。ED_PRI - 2000 - 0658 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0659:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000724 AnalogX代理DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0360.html参考:报价:1504参考:网址:http://www.securityfocus.com/bid/1504早些时候在AnalogX代理服务器4.04和缓冲区溢出允许远程攻击者造成拒绝服务通过一个长SOCKS4连接请求的用户ID。ED_PRI - 2000 - 0659 3投票:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:可以发表- 2000 - 0672:最终决定:阶段性裁决:修改:建议:20000803分配:20000802类别:科幻参考:BUGTRAQ: 20000721 jakarta tomcat…/管理参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.htmlJakarta Tomcat的默认配置不限制访问/管理上下文,它允许远程攻击者读取任意文件通过直接调用行政servlet添加上下文根目录。ED_PRI - 2000 - 0672 3投票:

页面最后更新或审查:2007年5月22日,