(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群RECENT-45 - 33的候选人



下面的集群包含33个候选人宣布11月13日至11月20日,2000年。注意,投票网站将不会更新这个集群,直到周三的某个时候。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。如果你发现任何RECENT-XX集群是不完整的对过程中发现的问题相关的时间框架,请发送信息给我,这样候选人可以被指定。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。 So if you don't have sufficient information for a candidate but you don't want to NOOP, use a REVIEWING. ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ====================================================== Candidate: CAN-2000-1096 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1096最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001116使得cron…参考网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0237.html参考:DEBIAN: 20001118 cron:本地特权升级参考:网址:http://www.debian.org/security/2000/20001118a参考:报价:1960参考:网址:http://www.securityfocus.com/bid/1960crontab保罗使得一个临时文件中,然后使用可预测的文件名称不正确确保文件是由用户执行定时任务- e命令,它允许本地用户以写模式访问crontab spool目录执行任意命令通过创建对外公开临时文件和修改它们,而受害者是编辑该文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1096 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1108网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1108最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113问题cons.saver参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0192.html参考:DEBIAN: 20001125 mc:本地DoS参考:网址:http://www.debian.org/security/2000/20001125参考:报价:1945参考:网址:http://www.securityfocus.com/bid/1945cons.saver早些时候在午夜指挥官(mc) 4.5.42和不正确验证如果一个输出文件描述符是一个遥控,它允许本地用户腐败文件通过创建一个符号链接到目标文件,调用mc,指定链接作为遥控参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1108 1供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1139网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1139最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:CF参考:女士:ms00 - 088参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 088. - asp参考:报价:1958参考:网址:http://www.securityfocus.com/bid/1958安装Microsoft Exchange 2000年启之前使用一个已知的创建一个用户帐户密码,这可能允许攻击者获得特权,又名“交换用户帐户”的弱点。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1139 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1167网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1167最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:FREEBSD: FreeBSD-SA-00:70参考:网址:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc参考:报价:1974参考:网址:http://www.securityfocus.com/bid/1974购买力平价实用程序在FreeBSD以下4.4.1早些时候不适当限制访问指定的“nat deny_incoming”命令,它允许远程攻击者连接到目标系统。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1167 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1169网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1169最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001123 OpenSSH安全顾问(adv.fwd)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0195.html参考:曼德拉草:MDKSA-2000:068参考:网址:http://www.linux mandrake.com/en/security/mdksa - 2000 - 068. - php3参考:BUGTRAQ: 20001115 Trustix安全顾问——绑定和openssh (modutils)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0217.html参考:DEBIAN: 20001118 openssh:可能的远程利用参考:网址:http://www.debian.org/security/2000/20001118参考:CONECTIVA: CLSA-2000:345参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000345参考:REDHAT: rhsa - 2000 - 111参考:网址:http://www.redhat.com/support/errata/rhsa - 2000 - 111. - html参考:SUSE: SuSE-SA: 2000:47参考:网址:http://lists.suse.com/archives/suse-security-announce/2000-Nov/0004.html参考:报价:1949参考:网址:http://www.securityfocus.com/bid/1949OpenSSH SSH客户机之前tripwire不恰当地禁用X11或代理转发,这可能允许恶意SSH服务器访问X11显示和嗅X11事件,或获得ssh-agent。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1169 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1174网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1174最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001118 (hacksware)的0.8.13 AFS ACL解析缓冲区溢出缺陷参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0251.html参考:DEBIAN: 20001121的:远程利用参考:网址:http://www.debian.org/security/2000/20001122a参考:CONECTIVA: CLSA-2000:342参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000342参考:REDHAT: RHSA-2000:116-05参考:网址:http://www.redhat.com/support/errata/rhsa - 2000 - 116. - html参考:报价:1972参考:网址:http://www.securityfocus.com/bid/1972多个缓冲区溢出在AFS ACL解析器的0.8.13早些时候,允许远程攻击者执行任意命令通过一个包有着悠久的用户名。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1174 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1178网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1178最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001116乔的编辑文件链接漏洞引用:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0227.html参考:REDHAT: RHSA-2000:110-06参考:网址:http://www.redhat.com/support/errata/rhsa - 2000 - 110. - html参考:曼德拉草:MDKSA-2000:072参考:网址:http://www.linux mandrake.com/en/security/mdksa - 2000 - 072. - php3参考:CONECTIVA: CLA-2000:356参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000356参考:DEBIAN: 20001121乔:符号链接攻击参考:网址:http://www.debian.org/security/2000/20001122参考:DEBIAN: 20001201 dsa - 003 - 1乔:符号链接攻击参考:网址:http://www.debian.org/security/2000/20001201参考:BUGTRAQ: 20001121 Immunix OS的安全更新乔·参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97500174210821&w=2参考:报价:1959参考:网址:http://www.securityfocus.com/bid/1959乔的文本编辑器创建救援时遵循符号链接复制叫DEADJOE异常退出时,它允许本地用户覆盖其他用户的文件,乔会话崩溃。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1178 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1184网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1184最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:FREEBSD: FreeBSD-SA-00:69参考:网址:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:69.telnetd.v1.1.asctelnetd FreeBSD 4.2和更早的,可能还有其他操作系统,允许远程攻击者造成拒绝服务通过指定任意大文件在TERMCAP环境变量,作为文件服务器进程,减少资源消耗。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1184 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1132网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1132最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001114 Cgisecurity.com dcforum参考咨询:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0218.html参考:报价:1951参考:网址:http://www.securityfocus.com/bid/1951参考:确认:http://www.dcscripts.com/dcforum/dcf万博下载包News/124.html # 1DCForum cgforum。cgi cgi脚本允许远程攻击者读取任意文件,和删除程序本身,通过一个畸形的“论坛”变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1132 2供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1179网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1179最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001115 Netopia ISDN路由器650:查看所有系统日志没有登录参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97440068130051&w=2参考:报价:1952参考:网址:http://www.securityfocus.com/bid/1952Netopia ISDN路由器650之前4.3.5允许远程攻击者读取系统日志没有身份验证通过直接连接到登录屏幕和输入特定的控制字符。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1179 2供应商确认:是的跟踪投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1181网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1181最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001116(核心SDI咨询)RealServer内存内容披露参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0236.html参考:确认:http://service.real.com/help/faq/security/memory.html参考:报价:1957参考:网址:http://www.securityfocus.com/bid/1957真实网络RealServer 7和早些时候允许远程攻击者获得部分RealServer的记忆内容,其中可能包括敏感信息,通过访问/管理/包括/ URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1181 2供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1182网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1182最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001116可能沃奇卫士燃烧室II DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0224.html参考:确认:https://www.watchguard.com/support/patches.html参考:报价:1953参考:网址:http://www.securityfocus.com/bid/1953沃奇卫士燃烧室II允许远程攻击者因洪水导致拒绝服务大量的燃烧室FTP或SMTP请求,该禁用代理处理。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1182 2供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 0897网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 0897最终决定:阶段性裁决:修改:建议:20001219分配:20001114类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20001114措施SmallHTTP服务器参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97421834001092&w=2参考:报价:1941参考:网址:http://www.securityfocus.com/bid/1941小HTTP服务器2.01允许远程攻击者造成拒绝服务通过多次请求URL引用目录不包含一个索引。html文件,不消耗内存请求完成后发布。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 0897 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 0898网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 0898最终决定:阶段性裁决:修改:建议:20001219分配:20001114类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20001114措施SmallHTTP服务器参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97421834001092&w=2小HTTP服务器2.01不妥善处理服务器端包含(SSI)标签,包含null值,它允许本地用户,甚至远程攻击,导致服务器崩溃,将SSI插入一个HTML文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 0898 3供应商确认:未知的包容:有人会争辩说,这可能不是一个弱点。远程攻击者可能只利用另一个漏洞的服务器,一个能让他们修改内容的HTML文件(说,通过跨站点脚本),或上传新文件(无论是服务器配置或服务器)中的缺陷。它可以辩称,如果本地攻击者,然后只如果服务器崩溃,“呆”坠毁。现在还不知道是否会出现这种情况。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 0899网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 0899最终决定:阶段性裁决:修改:建议:20001219分配:20001114类别:科幻/ CF / MP / SA / /未知参考:BUGTRAQ: 20001114措施SmallHTTP服务器参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97421834001092&w=2参考:报价:1942参考:网址:http://www.securityfocus.com/bid/1942小HTTP服务器2.01允许远程攻击者造成拒绝服务连接到服务器和发送多个,头,或POST请求和关闭连接之前,服务器响应请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 0899 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1126网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1126最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:惠普:hpsbux0011 - 130参考:网址:http://www.securityfocus.com/advisories/2850参考:报价:1954参考:网址:http://www.securityfocus.com/bid/1954脆弱性auto_parms和set_parms早些时候在hp - ux 11.00和允许远程攻击者执行任意命令或引起拒绝服务。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1126 3供应商确认:对咨询内容的决定:SF-EXEC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1150网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1150最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.html早些时候在BeOS r5 pro和Felix IRC客户机允许远程攻击者通过消息进行拒绝服务,包含一个长URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1150 3供应商确认:内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1151网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1151最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.html早些时候在BeOS r5 pro和巴克斯特IRC客户机允许远程攻击者进行拒绝服务通过一个消息包含一个长URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1151 3供应商确认:内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1152网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1152最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.html早些时候在BeOS r5 pro和浏览器IRC客户机允许远程攻击者通过消息进行拒绝服务,包含一个长URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1152 3供应商确认:内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1153网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1153最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.html早些时候在BeOS r5 pro和邮政局长1.0允许远程攻击者进行拒绝服务通过一个消息包含一个长URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1153 3供应商确认:内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1154网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1154最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.htmlRHConsole当罗宾汉1.1早些时候在BeOS r5 pro和web服务器允许远程攻击者造成拒绝服务通过HTTP请求。抽象:大参考表明错误发生在两个不同的源文件,当调用两个不同的功能,所以CD: SF-LOC表明错误RHConsole应该保持在RHDaemon分开。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1154 3供应商确认:内容决定:SF-EXEC, SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1155网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1155最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 beos漏洞参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.htmlRHDaemon当罗宾汉1.1早些时候在BeOS r5 pro和web服务器允许远程攻击者造成拒绝服务通过HTTP请求。抽象:大参考表明错误发生在两个不同的源文件,当调用两个不同的功能,所以CD: SF-LOC表明错误RHConsole应该保持在RHDaemon分开。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1155 3供应商确认:内容决定:SF-EXEC, SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1161网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1161最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:CF参考:BUGTRAQ: 20001120安全问题在AdCycle安装参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0271.html参考:报价:1969参考:网址:http://www.securityfocus.com/bid/1969安装AdCycle横幅管理系统构建。cgi程序web访问的目录中,它允许远程攻击者执行计划和查看密码或删除数据库。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1161 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1164网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1164最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:CF参考:BUGTRAQ: 20001118 WinVNC 3.3。x参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0253.html参考:报价:1961参考:网址:http://www.securityfocus.com/bid/1961WinVNC安装WinVNC3注册表键给予特殊的权限访问(读和修改)每个人集团,它允许用户读取和修改敏感信息,比如密码和访问系统。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1164 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1170网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1170最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001115 Netsnap摄像头软件远程溢出参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97439536016554&w=2参考:报价:1956参考:网址:http://www.securityfocus.com/bid/1956参考:确认:http://www.netsnap.com/new.htm缓冲区溢出在Netsnap摄像头HTTP服务器1.2.9允许远程攻击者执行任意命令通过一个GET请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1170 3供应商确认:确认:NetSnap版本历史版本1.2.9说:“固定在http服务器可以让NetSnap DOS(拒绝服务)攻击。”投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1171网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1171最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001120 CGIForum 1.0脆弱性参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0263.html参考:报价:1963参考:网址:http://www.securityfocus.com/bid/1963目录遍历cgiforum脆弱性。pl脚本CGIForum 1.0允许远程攻击者可以任意文件通过一个. .(点点)攻击“金利镇”参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1171 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1175网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1175最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001120当地利用linux Koules1.4包参考:网址:http://www.securityfocus.com/archive/1/145823参考:报价:1967参考:网址:http://www.securityfocus.com/bid/1967缓冲区溢出Koules 1.4允许本地用户执行任意命令通过一个命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1175 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1177网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1177最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001121老大哥咨询——命运研究实验室参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0284.html参考:确认:http://bb4.com/incident.nov21参考:报价:1971参考:网址:http://www.securityfocus.com/bid/1971bb-hist。sh, bb-histlog。sh, bb-hostsvc。sh, bb-rep。sh, bb-replog。sh, bb-ack。sh在老大哥(BB) 1.5 d3允许远程攻击者,以确定文件和用户ID的存在是通过指定的目标文件记录参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1177 3供应商确认:是的内容决定:SF-EXEC抽象:CD: SF-EXEC表明,因为这些是密切相关的项目在同一个软件包使用相同的错误,那么他们应该的总和。然而,它也可以辩称,由于每个缺陷分别出现在每个脚本(而不是一个共同的“图书馆”),每个错误应该被分开的结论。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1180网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1180最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:报价:1968参考:网址:http://www.securityfocus.com/bid/1968参考:BUGTRAQ: 20001120漏洞在连接管理器控制二进制在Oracle参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=97474521003453&w=2缓冲区溢出cmctl项目在Oracle 8.1.5连接管理器控制允许本地用户获得特权通过命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1180 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1183网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1183最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001115 socks5远程利用/ linux x86参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0219.html缓冲区溢出socks5服务器Linux允许攻击者通过长连接请求执行任意命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1183 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1185网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1185最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001113 Rideway PN Telnet DoS参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0201.html参考:报价:1938参考:网址:http://www.securityfocus.com/bid/1938RideWay PN的telnet代理代理服务器允许远程攻击者造成拒绝服务包含畸形通过大量的连接请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1185 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1186网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1186最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001115利用:公积金缓冲区溢出(CGI)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0221.html缓冲区溢出公积金CGI程序允许远程攻击者执行任意命令通过指定一个大量的参数,包括一个长MIME标头。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1186 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2000 - 1188网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2000 - 1188最终决定:阶段性裁决:修改:建议:20001219分配:20001214类别:科幻参考:BUGTRAQ: 20001120 Cgisecurity Quickstore购物车参考:网址:http://archives.neohapsis.com/archives/bugtraq/2000-11/0283.html目录遍历脆弱性Quikstore购物车程序允许rmeote攻击者读取任意文件通过一个. .(点点)攻击的“页面”参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2000 - 1188 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:

页面最后更新或审查:2007年5月22日,