(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群LEGACY-MS-ADV - 35的候选人



我提出集群LEGACY-MS-ADV供编辑部评论和投票。名称:LEGACY-MS-ADV描述:候选人在微软宣布公告/ KB文章,1999年早些时候,大小:35通过修改这封邮件你可能投票的候选人投票,将它寄回给我,或通过使用CVE投票网站。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出的等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ====================================================== Candidate: CAN-1999-0154 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 0154最终决定:阶段性裁决:修改:建议:20010912分配:19990607类别:科幻参考:MSKB: Q163485参考:MSKB: Q164059参考:BUGTRAQ: 19970220 !(咨询)重大安全漏洞ASP参考女士:XF: http-iis-aspdot参考:XF: http-iis-aspsource IIS 2.0和3.0允许远程攻击者读取源代码通过附加一个ASP页面。(点)的URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 0154 1供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 0815网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 0815最终决定:阶段性裁决:修改:建议:20010912分配:19991125类别:科幻参考:MSKB: Q196270参考:网址:http://support.microsoft.com/support/kb/articles/q196/2/70.asp内存泄漏的SNMP代理在Windows NT 4.0 SP5允许远程攻击者进行拒绝服务(内存耗尽)通过大量的查询。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 0815 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1035网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1035最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 019参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 019. - asp参考:MSKB: Q192296参考:网址:http://support.microsoft.com/support/kb/articles/q192/2/96.aspIIS 3.0和4.0在x86和α允许远程攻击者造成拒绝服务(挂)通过GET请求畸形,即IIS漏洞“得到”。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1035 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1055网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1055最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 018参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 018. - asp参考:报价:179参考:网址:http://www.securityfocus.com/vdb/bottom.html?vid=179参考:XF: excel-call(1737)参考:网址:http://xforce.iss.net/static/1737.phpMicrosoft Excel 97不警告用户在执行工作表函数之前,这可能允许攻击者执行任意命令通过调用函数来执行一个恶意的DLL,又名Excel“叫弱点。”Analysis ---------------- ED_PRI CAN-1999-1055 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-1999-1087 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1087最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 016参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 016. - asp参考:MSKB: Q168617参考:网址:http://support.microsoft.com/support/kb/articles/q168/6/17.asp参考:确认:http://www.microsoft.com/Windows/Ie/security/dotless.asp参考:XF: ie-dotless(2209)参考:网址:http://xforce.iss.net/static/2209.phpInternet Explorer 4把32位的数量(“dotless IP地址”)的URL作为主机名而不是IP地址,导致IE应用本地内部网区设置生成的web页面,允许远程恶意web服务器进行未经授权的活动通过使用URL包含dotless IP地址的服务器。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1087 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1093网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1093最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 011参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 011. - asp缓冲区溢出的窗口。外部函数在早些时候在Internet Explorer 4.01 SP1和JScript脚本引擎允许远程攻击者通过恶意网页执行任意命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1093 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1094网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1094最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q176697参考:网址:http://support.microsoft.com/support/kb/articles/q176/6/97.asp参考:BUGTRAQ: 19980114 L0pht咨询MSIE4.0(1)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=88480839506155&w=2参考:XF: iemk-bug(917)参考:网址:http://xforce.iss.net/static/917.php缓冲区溢出在Internet Explorer 4.01和更早的允许远程攻击者通过一个长URL执行任意命令“可:“协议,又称“可被安全问题。”Analysis ---------------- ED_PRI CAN-1999-1094 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-1999-1104 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1104最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:BUGTRAQ: 19951205破解:WINDOWS。PWL参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=87602167418931&w=2参考:NTBUGTRAQ: 19980121如何恢复私钥对各种微软产品参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88540877601866&w=2参考:BUGTRAQ: 19980120如何恢复私钥对各种微软产品参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=88536273725787&w=2参考:MSKB: Q140557 Windows 95使用弱加密的密码列表(.pwl)文件时使用密码启用缓存,它允许本地用户获得特权通过解密密码。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1104 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1127网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1127最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 017参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 017. - asp参考:MSKB: Q195733参考:网址:http://support.microsoft.com/support/kb/articles/Q195/7/33.aspWindows NT 4.0不正确关闭无效的命名管道RPC连接,远程攻击者可以引起拒绝服务(资源枯竭)通过一系列的连接包含畸形数据,又名“命名管道/ RPC漏洞。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1127 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1132网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1132最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:BUGTRAQ: 19981005 NMRC咨询-跛NT令牌环DoS参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=90763508011966&w=2参考:NTBUGTRAQ: 19981002 NMRC咨询-跛NT令牌环DoS参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=90760603030452&w=2参考:MSKB: Q179157参考:网址:http://support.microsoft.com/support/kb/articles/Q179/1/57.asp参考:XF: token-ring-dos (1399) Windows NT 4.0允许远程攻击者造成拒绝服务(崩溃)通过额外的源路由数据,如(1)路由信息字段(RIF)字段和跳数大于7,或(2)一个列表包含重复的令牌环id。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1132 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1148网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1148最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 006参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 006. - asp参考:MSKB: Q189262参考:网址:http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP参考:XF: iis-passive-ftp(1215)参考:网址:http://xforce.iss.net/static/1215.php早些时候在IIS 4.0和FTP服务允许远程攻击者造成拒绝服务(资源枯竭)通过许多被动(PASV)连接在同一时间。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1148 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1157网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1157最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q192774参考:网址:http://support.microsoft.com/support/kb/articles/Q192/7/74.ASP参考:XF: tcpipsys-icmp-dos(3894)参考:网址:http://xforce.iss.net/static/3894.phpTcpip。在Windows NT 4.0系统SP4允许远程攻击者造成拒绝服务通过一个ICMP子网掩码地址请求数据包,当某些多个IP地址绑定到相同的网络接口。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1157 1供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1222网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1222最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q188571参考:网址:http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP参考:XF: dns-netbtsys-dos(3893)参考:网址:http://xforce.iss.net/static/3893.phpNetbt。在Windows NT 4.0系统允许远程恶意DNS服务器导致拒绝服务(崩溃)通过返回0.0.0.0作为DNS主机名的IP地址查找。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1222 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1223网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1223最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q187503参考:网址:http://support.microsoft.com/support/kb/articles/q187/5/03.asp参考:XF: url-asp-av(3892)参考:网址:http://xforce.iss.net/static/3892.phpIIS 3.0允许远程攻击者造成拒绝服务通过一个请求一个ASP页面的URL包含大量的/(斜杠)字符。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1223 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1233网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1233最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms99 - 039参考:网址:http://www.microsoft.com/technet/security/bulletin/ms99 - 039. - asp参考:MSKB: 241562参考:网址:http://support.microsoft.com/support/kb/articles/Q241/5/62.asp参考:报价:657参考:网址:http://www.securityfocus.com/bid/657参考:XF: iis-unresolved-domain-access(3306)参考:网址:http://xforce.iss.net/static/3306.phpIIS 4.0不适当限制初始会话请求从用户的IP地址,如果地址不解决一个DNS域,又名“领域决议”的弱点。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1233 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1246网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1246最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q229972参考:网址:http://support.microsoft.com/support/kb/articles/Q229/9/72.asp参考:XF: siteserver-directmail-passwords(2068)参考:网址:http://xforce.iss.net/static/2068.php微软网站服务器3.0直接梅勒特性节省了用户域名和密码的明文TMLBQueue网络共享,不安全的默认权限,允许远程攻击者读取密码和获得的特权。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1246 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1259网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1259最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q189529参考:网址:http://support.microsoft.com/support/kb/articles/q189/5/29.asp参考:XF: office-extraneous-data(1780)参考:网址:http://xforce.iss.net/static/1780.php微软Office 98, Macintosh版,不适当的初始化磁盘空间使用Office 98文件和有效地将数据从之前删除文件插入到办公室文件,这可能允许攻击者获取敏感信息。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1259 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1279网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1279最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q138001参考:网址:http://support.microsoft.com/support/kb/articles/q138/0/01.asp参考:XF: snaserver-shared-folders(1548)参考:网址:http://xforce.iss.net/static/1548.phpAS / 400共享文件夹功能之间的交互和微软系统网络体系结构(SNA) Server 3.0和更早的允许用户查看彼此的文件夹当用户共享相同的地方怎么会出现。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1279 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1294网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1294最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q146604参考:网址:http://support.microsoft.com/support/kb/articles/q146/6/04.asp办公室快捷键栏(的OSB)在Windows 3.51支持备份和恢复权限,所继承的程序等文件管理器的快捷栏开始,这可能允许本地用户不允许他们阅读文件夹。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1294 1供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1316网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1316最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q247975参考:网址:http://support.microsoft.com/support/kb/articles/Q247/9/75.aspPassfilt。dll在Windows NT SP2允许用户创建一个包含用户名的密码,这可能使攻击者更容易猜测。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1316 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1317网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1317最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:NTBUGTRAQ: 19990312[警告]大小写敏感性和符号链接参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=92127046701349&w=2参考:NTBUGTRAQ: 19990314亚历山大-伍尔兹:[警告]大小写敏感性和符号链接参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=92162979530341&w=2参考:MSKB: Q222159参考:网址:http://support.microsoft.com/support/kb/articles/q222/1/59.aspWindows NT 4.0 SP4,允许本地用户获得特权早些时候通过修改\符号链接表? ?文件夹对象使用不同的例信(上或下)指向一个不同的设备。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1317 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1358网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1358最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q157673参考:网址:http://support.microsoft.com/support/kb/articles/q157/6/73.asp当管理员在Windows NT或Windows 2000更改用户政策,方针是不正确如果当地ntconfig更新。波尔不是由用户可写,这可能允许本地用户绕过限制,否则被强制执行的政策,可能通过改变政策文件是只读的。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1358 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1359网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1359最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q163875参考:网址:http://support.microsoft.com/support/kb/articles/q163/8/75.asp当Ntconfig。使用波尔文件服务器上,他的名字叫超过13个字符,Windows NT不正确执行政策对全球组织,这可能允许用户绕过限制,目的是通过这些政策。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1359 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1360网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1360最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q160650参考:网址:http://support.microsoft.com/support/kb/articles/q160/6/50.aspWindows NT 4.0允许本地用户造成拒绝服务通过一个用户模式应用程序在内核模式下打开关闭处理,导致崩溃,当内核试图关闭处理。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1360 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1362网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1362最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q160601参考:网址:http://support.microsoft.com/support/kb/articles/q160/6/01.aspWin32k。系统在Windows NT 4.0 SP2允许本地用户造成拒绝服务(崩溃)通过调用某些WIN32K功能不正确的参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1362 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1363网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1363最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q163143参考:网址:http://support.microsoft.com/support/kb/articles/q163/1/43.aspWindows NT 3.51和4.0允许本地用户造成拒绝服务(崩溃)通过运行一个程序,创建大量的锁定一个文件,它尾气NonPagedPool。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1363 1供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1364网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1364最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q142653参考:网址:http://support.microsoft.com/support/kb/articles/q142/6/53.aspWindows NT 4.0允许本地用户造成拒绝服务(崩溃)通过一个非法的内核模式地址功能(1)或(2)SetThreadContext GetThreadContext。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1364 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1451网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1451最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q231368参考:网址:http://support.microsoft.com/support/kb/articles/q231/3/68.asp参考:女士:ms99 - 013参考:网址:http://www.microsoft.com/technet/security/bulletin/ms99 - 013. - asp参考:XF: iis-samples-winmsdp(3271)参考:网址:http://xforce.iss.net/static/3271.phpWinmsdp。exe在IIS 4.0示例文件,网站服务器3.0允许远程攻击者读取任意文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1451 1供应商确认:是的咨询Winmsdp。exe没有可以,但是viewcode showcode /等。做的,所以这个应该分配给可以一致。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1452网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1452最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:NTBUGTRAQ: 19990129 ole对象在一个“安全”环境?参考网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=91764169410814&w=2参考:NTBUGTRAQ: 19990205提醒:发布女士GINA-fix SP3, SP4,和TS参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=91822011021558&w=2参考:BUGTRAQ: 19990129 ole对象在一个“安全”环境?参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=91788829326419&w=2参考:MSKB: Q214802参考:网址:http://support.microsoft.com/support/kb/articles/q214/8/02.asp参考:报价:198参考:网址:http://www.securityfocus.com/bid/198参考:XF: nt-gina-clipboard(1975)参考:网址:http://xforce.iss.net/static/1975.php吉娜在Windows NT 4.0允许攻击者与物理访问显示部分用户锁定工作站的剪贴板粘贴(ctrl - v)内容到用户名提示。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1452 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1455网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1455最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q158320参考:网址:http://support.microsoft.com/support/kb/articles/q158/3/20.aspRSH服务实用程序在Windows NT 3.5 RSHSVC通过4.0不适当限制. rhosts文件中指定当用户来自一个授权主机,这可能允许未经授权的用户访问服务由授权登录主机。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1455 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1472网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1472最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:BUGTRAQ: 19971017安全漏洞在Explorer 4.0参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=87710897923098&w=2参考:MISC:http://www.insecure.org/sploits/Internet_explorer_4.0.hack.html参考:确认:http://www.microsoft.com/Windows/ie/security/freiburg.asp参考:MSKB: Q176794参考:网址:http://support.microsoft.com/support/kb/articles/q176/7/94.asp参考:MSKB: Q176697参考:网址:http://support.microsoft.com/support/kb/articles/q176/6/97.asp参考:XF: http-ie-spy(587)参考:网址:http://xforce.iss.net/static/587.phpInternet Explorer 4.0允许远程攻击者读取任意文本和HTML文件在用户的机器上通过一个小IFRAME,使用动态HTML (DHTML)发送数据到攻击者,即弗莱堡文本查看问题。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1472 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1473网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1473最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:MSKB: Q176697参考:网址:http://support.microsoft.com/support/kb/articles/q176/6/97.asp当一个网站将浏览器重定向到另一个网站,Internet Explorer 3.02和4.0自动重新发送验证信息到第二个网站,又称“页面重定向问题。”Analysis ---------------- ED_PRI CAN-1999-1473 1 Vendor Acknowledgement: Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-1999-1476 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1476最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:参考:MSKB: Q163852参考:网址:http://support.microsoft.com/support/kb/articles/q163/8/52.asp参考:XF: pentium-crash(704)参考:网址:http://xforce.iss.net/static/704.php英特尔奔腾处理器的bug (MMX和超速)允许本地用户造成拒绝服务(挂)基于英特尔处理器的操作系统,比如Windows NT和Windows 95,通过一个无效的指令,也就是“无效与锁定是因为操作数指令”的问题。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1476 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1043网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1043最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:科幻参考:女士:ms98 - 007参考:网址:http://www.microsoft.com/technet/security/bulletin/ms98 - 007. - aspMicrosoft Exchange Server 5.5和5.0不妥善处理(1)畸形NNTP数据,或(2)畸形的SMTP数据,允许远程攻击者造成拒绝服务(应用程序错误)。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1043 3供应商确认:对咨询内容的决定:SF-EXEC, SF-LOC抽象:CD: SF-EXEC表明结合多个可执行文件和同样的问题在同一个版本的相同的软件包。没有足够详细的咨询来确定类型的“错误数据”,损害了SMTP服务是完全不同类型的不正确的数据,影响工作。如果有足够的细节,和错误数据的类型是不同的,然后CD: SF-LOC建议创建单独的条目。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 1999 - 1084网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 1999 - 1084最终决定:阶段性裁决:修改:建议:20010912分配:20010831类别:CF参考:NTBUGTRAQ: 19980622另一个利用“让自己管理的权利:参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=90222453431604&w=2参考:MSKB: Q103861参考:网址:http://support.microsoft.com/support/kb/articles/q103/8/61.asp参考:女士:ms00 - 008参考:网址:http://www.microsoft.com/technet/security/bulletin/ms00 - 008. - asp参考:CIAC: k - 029参考:网址:http://www.ciac.org/ciac/bulletins/k - 029. shtml参考:报价:1044参考:网址:http://www.securityfocus.com/bid/1044“AEDebug”注册表关键是安装不安全的权限,它允许本地用户修改指定一个特洛伊木马的关键调试器自动执行在系统崩溃。分析- - - - - - - - - - - - - - - - - ED_PRI - 1999 - 1084 3供应商确认:对咨询内容的决定:CF-PERM投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:

页面最后更新或审查:2007年5月22日,