(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群最近- 81 - 61的候选人



我最近提出集群——81年由编辑委员会审查和投票。名称:最近- 81描述:候选人宣布8/2/2001与11/2/2001大小:61年通过修改这封邮件你可能投票的候选人投票,将它寄回给我,或通过使用CVE投票网站。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。如果你发现任何RECENT-XX集群是不完整的对过程中发现的问题相关的时间框架,请发送信息给我,这样候选人可以被指定。——史蒂夫总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。 So if you don't have sufficient information for a candidate but you don't want to NOOP, use a REVIEWING. ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ====================================================== Candidate: CAN-2001-1100 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1100最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011007错误发现W3Mail邮箱参考:网址:http://www.securityfocus.com/archive/1/218921参考:确认:http://www.w3mail.org/ChangeLog参考:报价:3673参考:网址:http://www.securityfocus.com/bid/3673参考:XF: w3mail-metacharacters-command-execution(7230)参考:网址:http://xforce.iss.net/static/7230.phpsendmessage。cgi W3Mail 1.0.2,可能其他cgi程序,允许远程攻击者通过执行任意命令shell元字符在任何领域的组合信息的页面。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1100 1供应商确认:是的、确认:在1.0.3版本的更新日志,12月4日,2001年,供应商说“固定潜在的安全利用过滤特殊元字符。”投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1113网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1113最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010813当地利用trollftpd - 1.26参考:网址:http://www.securityfocus.com/archive/1/203874参考:确认:ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz参考:XF: trollftpd-long-path-bo(6974)参考:网址:http://xforce.iss.net/static/6974.php参考:报价:3174参考:网址:http://www.securityfocus.com/bid/3174缓冲区溢出TrollFTPD 1.26和更早的允许本地用户执行任意代码通过创建一系列深层嵌套的具有长名称的目录,然后运行ls - r(递归)命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1113 1供应商确认:确认是的补丁:揭露者说,在一个固定的版本ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz。没有明确确认的网站或README文件。看看listdir ls ()。c使用表明,snprintf pathnmes副本。问题是,这是修复*总是*,还是加了?幸运的是我们可以下载troll-ftpd-1.26.tar。广州和ls之间做一个比较。从1.26和1.27 c文件…果然,snprintf 1.27 1.26使用sprintf而使用。所以我们有间接供应商确认通过创建一个补丁。QED。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。 VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2001-1117 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1117最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010810 Linksys路由器安全修复参考:网址:http://www.securityfocus.com/archive/1/203302参考:BUGTRAQ: 20010802咨询更新:设计缺陷在路由器EtherFast并参考:网址:http://www.securityfocus.com/archive/1/201390参考:确认:ftp://ftp.linksys.com/pub/befsr41/befsr-fw1402.zip参考:XF: linksys-etherfast-reveal-passwords(6949)参考:网址:http://xforce.iss.net/static/6949.php参考:报价:3141参考:网址:http://www.securityfocus.com/bid/3141路由器EtherFast BEFSR41电缆/ DSL路由器固件运行之前1.39.3β允许远程攻击者查看管理和用户密码通过连接路由器和查看HTML源代码(1)指数。htm和(2)Password.htm。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1117 1供应商确认:是的确认:在befsr-fw1402。拉链可以从供应商,notes版本4.40.2版本。txt,日期为2001年10月24日说:“5。固定一段时间用户可以看到UI页面没有密码问题”投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION,或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1118网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1118最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010802 Roxen安全警报:URL解码脆弱参考:网址:http://www.securityfocus.com/archive/1/201476参考:BUGTRAQ: 20010802弗兰克-威廉姆斯:安全警报:远程用户可以访问任何文件参考:网址:http://www.securityfocus.com/archive/1/201499参考:确认:http://download.roxen.com/2.0/patch/security-notice.html参考:报价:3145参考:网址:http://www.securityfocus.com/bid/3145参考:XF: roxen-urlrectifier-retrieve-files(6937)参考:网址:http://xforce.iss.net/static/6937.php2.0.92前一个模块在Roxen 2.0, 2.1 2.1.264之前,不正确解码utf - 8, Mac和iso - 2202编码的URL,这可能允许远程攻击者执行任意命令或查看任意文件通过一个编码的URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1118 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1119网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1119最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:CERT-VN: VU # 105347参考:网址:http://www.kb.cert.org/vuls/id/105347参考:SUSE: SuSE-SA: 2001:025参考:网址:http://www.suse.de/de/support/security/2001_025_xmcd_txt.html参考:报价:3148参考:网址:http://www.securityfocus.com/bid/3148参考:XF: xmcd-cda-symlink(6941)参考:网址:http://xforce.iss.net/static/6941.php在xmcd cda 3.0.2和SuSE Linux 2.6允许本地用户覆盖任意文件通过一个符号链接攻击。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1119 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1130网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1130最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010802 suse: sdbsearch。cgi漏洞参考:网址:http://www.securityfocus.com/archive/1/201216参考:SUSE: SuSE-SA: 2001:027参考:网址:http://www.suse.de/de/support/security/2001_027_sdb_txt.txt参考:XF: sdbsearch-cgi-command-execution(7003)参考:网址:http://xforce.iss.net/static/7003.phpSdbsearch。cgi在SuSE Linux 6.0 - -7.2可以允许远程攻击者通过上传keylist执行任意命令。txt文件包含文件名与shell元字符,然后导致文件搜索使用. .在HTTP推荐人(从HTTP_REFERER变量)指向的目录包含keylist。txt文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1130 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1132网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1132最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:CF参考:CONECTIVA: CLA-2001:420参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000420参考:XF: mailman-blank-passwords(7091)参考:网址:http://xforce.iss.net/static/7091.php邮差2.0。x之前2.0.6允许远程攻击者获得列表管理页面,当有一个空列表网站或密码,不妥善处理在调用地下室在身份验证功能。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1132 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1147网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1147最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011008是的。所以错误! !参考网址:http://www.securityfocus.com/archive/1/219175参考:REDHAT: RHSA-2001:132参考:网址:http://www.redhat.com/support/errata/rhsa - 2001 - 132. - html参考:曼德拉草:MDKSA-2001:084参考:网址:http://www.linux mandrake.com/en/security/2001/mdksa - 2001 - 084. - php3参考:SUSE: SuSE-SA: 2001:034参考:网址:http://www.suse.de/de/support/security/2001_034_shadow_txt.txt参考:CIAC: m - 009参考:网址:http://www.ciac.org/ciac/bulletins/m - 009. shtml参考报价:3415参考:URL:网址:http://www.securityfocus.com/bid/3415参考:XF: utillinux-pamlimits-gain-privileges(7266)参考:网址:http://www.iss.net/security_center/static/7266.phpPAM实现/bin/login util-linux包之前2.11导致密码输入的跨多个PAM调用重写,这可以提供一个用户到另一个用户的凭证,使用时在某些PAM模块如:是的。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1147 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1153网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1153最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:火山口:综援- 2001上海合作组织。15参考:网址:http://archives.neohapsis.com/archives/bugtraq/2001-08/0391.html参考:XF: openunix-lpsystem-bo(7041)参考:网址:http://www.iss.net/security_center/static/7041.php参考:报价:3248参考:网址:http://online.securityfocus.com/bid/3248在OpenUnix lpsystem 8.0.0允许本地用户可能导致拒绝服务和执行任意代码通过一个命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1153 1供应商确认:是的咨询顾问描述行为指示缓冲区溢出;因此,我的选择给我们有限的时间限制。长期争论导致lpsystem分割违反。不幸的是这个url不给我:ftp://stage.caldera.com/pub/security/openunix/cssa - 2001 sco.15/,所以我满足自己neohapsis档案参考。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1155网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1155最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:FREEBSD: FreeBSD-SA-01:56参考:网址:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:56.tcp_wrappers.ascTCP包装器(tcp_wrappers)在FreeBSD以下4.4.1 4.3偏执ACL选项启用不正确检查反向DNS查询的结果,这可能允许远程攻击者绕过目的访问限制通过DNS欺骗。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1155 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1166网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1166最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:FREEBSD: FreeBSD-SA-01:55参考:网址:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:55.procfs.asc参考:XF: linprocfs-process-memory-leak(7017)参考:网址:http://www.iss.net/security_center/static/7017.php参考:报价:3217参考:网址:http://www.securityfocus.com/bid/3217linprocfs FreeBSD 4.3和更早的不适当限制访问内核内存,它允许一个进程与调试权利特权进程读取限制内存的过程。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1166 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1089网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1089最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010910 RUS-CERT咨询2001 - 09:01参考:网址:http://www.securityfocus.com/archive/1/213331参考:报价:3314参考:网址:http://www.securityfocus.com/bid/3314参考:XF: postgresql-nss-authentication-modules(7111)参考:网址:http://xforce.iss.net/static/7111.php在nss-pgsql libnss-pgsql 0.9.0早些时候,允许远程攻击者执行任意SQL查询的SQL代码插入一个HTTP请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1089 2供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1095网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1095最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:AIXAPAR: IY23401参考:网址:http://archives.neohapsis.com/archives/aix/2001-q4/0000.html缓冲区溢出在AIX uuq 4 alllow本地用户可以执行任意代码通过一个长- r参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1095 2供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1096网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1096最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:AIXAPAR: IY23402参考:网址:http://archives.neohapsis.com/archives/aix/2001-q4/0000.html缓冲区溢出在AIX muxatmd 4允许攻击者可能导致核心转储和执行代码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1096 2供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1099网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1099最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:CF参考:BUGTRAQ: 20010907 Microsoft Exchange +诺顿防病毒泄漏本地信息参考:网址:http://www.securityfocus.com/archive/1/212724参考:BUGTRAQ: 20010912 Re: Microsoft Exchange +诺顿防病毒泄漏本地信息参考:网址:http://www.securityfocus.com/archive/1/213762参考:XF: nav-exchange-reveal-information(7093)参考:网址:http://xforce.iss.net/static/7093.php参考:报价:3305参考:网址:http://www.securityfocus.com/bid/3305诺顿杀毒软件的默认配置为微软Exchange 2000 2。x允许远程攻击者识别收件人的收件箱文件路径通过发送电子邮件和附件包含恶意内容,其中包括道路的拒绝通知。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1099 2供应商确认:是的跟踪投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1116网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1116最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:NTBUGTRAQ: 20010802 Identix BioLogon客户安全缺陷参考:网址:http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=IND0108&L=NTBUGTRAQ&F=P&S=&P=71参考:NTBUGTRAQ: 20010808应对Identix BioLogon客户安全缺陷参考:网址:http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind0108&L=ntbugtraq&F=P&S=&P=724参考:XF: dentix-biologon-auth-bypass(6948)参考:网址:http://xforce.iss.net/static/6948.php参考:报价:3140参考:网址:http://www.securityfocus.com/bid/3140Identix BioLogon 2.03和更早的不锁二次显示在多显示器系统上运行Windows 98或我,它允许攻击者与物理访问通过辅助显示系统绕过身份验证。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1116 2供应商确认:是的跟踪投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1149网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1149最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:VULN-DEV: 20010821 RE:错误报告——240649号事件参考:网址:http://www.securityfocus.com/archive/82/209328熊猫卫士铂6.23.00之前允许remore攻击者造成拒绝服务(崩溃)当用户选择一个动作一个畸形UPX可执行文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1149 2供应商确认:是的跟踪投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1090网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1090最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010910 RUS-CERT咨询2001 - 09:01参考:网址:http://www.securityfocus.com/archive/1/213331参考:报价:3315参考:网址:http://www.securityfocus.com/bid/3315参考:XF: postgresql-nss-authentication-modules(7111)参考:网址:http://xforce.iss.net/static/7111.phpnss_postgresql 0.6.1之前,允许远程攻击者执行任意SQL查询的SQL代码插入一个HTTP请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1090 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1091网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1091最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:NETBSD: NETBSD - sa2001 - 014参考:网址:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd sa2001 txt.asc——014.参考:XF: bsd-dump-tty-privileges(7037)参考:网址:http://xforce.iss.net/static/7037.php(1)转储和(2)在NetBSD 1.4 dump_lfs命令。x通过1.5.1不适当放弃特权,这可能允许本地用户权限通过RCMD_CMD环境变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1091 3供应商确认:对咨询内容的决定:SF-EXEC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1092网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1092最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010910数字Unix 4.0 x msgchk多个漏洞参考:网址:http://www.securityfocus.com/archive/1/213238参考:CERT-VN: VU # 440539参考:网址:http://www.kb.cert.org/vuls/id/440539参考:报价:3320参考:网址:http://www.securityfocus.com/bid/3320参考:XF: du-msgchk-symlink(7102)参考:网址:http://xforce.iss.net/static/7102.php早些时候在数字UNIX 4.0 g和msgchk允许本地用户读取任意文件的第一行通过一个符号链接攻击.mh_profile文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1092 3供应商确认:未知的内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1093网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1093最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010910数字Unix 4.0 x msgchk多个漏洞参考:网址:http://www.securityfocus.com/archive/1/213238参考:XF: du-msgchk-bo(7101)参考:网址:http://xforce.iss.net/static/7101.php参考:报价:3311参考:网址:http://www.securityfocus.com/bid/3311缓冲区溢出在早些时候在数字UNIX 4.0 g和msgchk允许本地用户执行任意代码通过一个命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1093 3供应商确认:未知的内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1094网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1094最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010911伙伴学校为Windows 2000终端服务和管理漏洞NT4参考:网址:http://www.securityfocus.com/archive/1/213516参考:报价:3321参考:网址:http://www.securityfocus.com/bid/3321参考:XF: netop-school-bypass-authentication(7120)参考:网址:http://xforce.iss.net/static/7120.php伙伴学校1.5允许本地用户绕过访问限制政府版本登录到学生,关闭学生版本,然后开始管理版本。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1094 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1098网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1098最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011010漏洞:思科PIX防火墙经理参考:网址:http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html参考:XF: cisco-pfm-plaintext-password(7265)参考:网址:http://xforce.iss.net/static/7265.php思科PIX防火墙管理器(PFM) 4.3 (2) g日志启用密码明文的烤瓷。日志文件,允许本地用户获取密码通过阅读该文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1098 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1101网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1101最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010908错误在检查站远程GUI访问防火墙参考:网址:http://www.securityfocus.com/archive/1/212826参考:XF: fw1-log-file-overwrite(7095)参考:网址:http://xforce.iss.net/static/7095.php参考:报价:3303参考:网址:http://www.securityfocus.com/bid/3303日志查看器功能检查防火墙1 GUI Solaris 3.0 b通过4.1 SP2不检查”的存在。日志文件保存文件时,(1)远程通过身份验证的用户可以覆盖任意文件结束的。日志”,或(2)本地用户覆盖任意文件通过一个符号链接攻击。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1101 3供应商确认:未知的内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1102网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1102最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010908错误在编译部分旧版本的检查点防火墙参考:网址:http://www.securityfocus.com/archive/1/212824参考:XF: fw1-tmp-file-symlink(7094)参考:网址:http://xforce.iss.net/static/7094.php参考:报价:3300参考:网址:http://www.securityfocus.com/bid/3300检查防火墙1 4.1 3.0 b通过Solaris允许本地用户覆盖任意文件通过一个符号链接攻击临时政策文件,结束在一个. cpp扩展,这是人人可写的。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1102 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1105网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1105最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:CIAC: l - 141参考:网址:http://www.ciac.org/ciac/bulletins/l - 141. shtml参考:思科:20010912脆弱的SSL实现iCDN参考:网址:http://www.cisco.com/warp/public/707/SSL-J-pub.html参考:确认:http://www.rsasecurity.com/products/bsafe/bulletins/BSAFE_SSL-J_3.x.SecurityBulletin.html参考:报价:3329参考:网址:http://www.securityfocus.com/bid/3329参考:XF: bsafe-ssl-bypass-authentication(7112)参考:网址:http://xforce.iss.net/static/7112.phpRSA BSAFE SSL-J 3.0, 3.0.1, 3.1, 2.0中使用思科iCND,缓存会话id从失败的登录尝试,这可能允许远程攻击者绕过SSL客户机身份验证和访问敏感数据通过登录后最初的失败。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1105 3供应商确认:对咨询内容的决定:SF-CODEBASE投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1109网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1109最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010912 EFTP版本2.0.7.337漏洞参考:网址:http://www.securityfocus.com/archive/1/213647参考:MISC:http://www.eftp.org/releasehistory.html参考:XF: eftp-list-directory-traversal(7113)参考:网址:http://xforce.iss.net/static/7113.php参考:XF: eftp-quote-reveal-information(7114)参考:网址:http://xforce.iss.net/static/7114.php参考:报价:3331参考:网址:http://www.securityfocus.com/bid/3331参考:报价:3333参考:网址:http://www.securityfocus.com/bid/3333目录遍历脆弱性EFTP 2.0.7.337允许远程身份验证的用户显示目录内容通过一个. .(点点)(1),(2)引用的大小,和(3)引用MDTM命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1109 3供应商确认:未知的模糊的内容决定:SF-LOC确认:发布历史上可能的ack 2001.12.04:“固定一些安全缺陷目录清单。”However, this is not clear enough to be absolutely certain. Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2001-1110 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1110最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010912 EFTP版本2.0.7.337漏洞参考:网址:http://www.securityfocus.com/archive/1/213647EFTP 2.0.7.337允许远程攻击者获得NETBIOS凭证通过请求信息网络共享文件,导致服务器将凭证发送给主机拥有份额,并允许攻击者嗅连接。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1110 3供应商确认:内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1111网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1111最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010912 EFTP版本2.0.7.337漏洞参考:网址:http://www.securityfocus.com/archive/1/213647参考:XF: eftp-plaintext-password(7116)参考:网址:http://xforce.iss.net/static/7116.php参考:报价:3332参考:网址:http://www.securityfocus.com/bid/3332EFTP 2.0.7.337 eftp2users存储用户密码明文。dat文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1111 3供应商确认:未知的内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1112网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1112最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010912 EFTP版本2.0.7.337漏洞参考:网址:http://www.securityfocus.com/archive/1/213647参考:报价:3330参考:网址:http://www.securityfocus.com/bid/3330参考:XF: eftp-lnk-bo(7115)参考:网址:http://xforce.iss.net/static/7115.php缓冲区溢出在EFTP 2.0.7.337允许远程攻击者执行任意代码通过上传.lnk文件包含大量的字符。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1112 3供应商确认:未知的内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1114网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1114最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010813 NetCode数控书0.2 b远程命令执行漏洞参考:网址:http://www.securityfocus.com/archive/1/204094参考:XF: netcode-book-pipes-command(6986)参考:网址:http://xforce.iss.net/static/6986.php参考:报价:3178参考:网址:http://www.securityfocus.com/bid/3178书。cgi NetCode数控书0.2 b允许远程攻击者通过shell元字符执行任意命令在“当前”参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1114 3供应商确认:未知的外交承认:Ack未知……看不懂俄罗斯:网址:http://www.lgg.ru/投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1115网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1115最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010813 SIX-webboard 2.01“显示文件”漏洞参考:网址:http://www.securityfocus.com/archive/1/204053参考:XF: sixwebboard-dot-directory-traversal(6975)参考:网址:http://xforce.iss.net/static/6975.php参考:报价:3175参考:网址:http://www.securityfocus.com/bid/3175生成。cgi SIX-webboard 2.01之前,允许远程攻击者通过点点读取任意文件(. .)在内容参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1115 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1122网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1122最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010803转发:破坏当地DoS在WinNT SP6a参考:网址:http://www.securityfocus.com/archive/1/201722参考:XF: winnt-nt4all-dos(6943)参考:网址:http://xforce.iss.net/static/6943.php参考:报价:3144参考:网址:http://www.securityfocus.com/bid/3144Windows NT 4.0 SP 6允许本地用户以写模式访问winnt / system32系统导致拒绝服务(lsass.exe崩溃)通过运行NT4ALL利用程序在“特殊”模式。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1122 3供应商确认:未知的内容决定:包容包容:海报表明,用户必须具有写访问winnt / system32系统利用这一点。如果这些权限都足以让用户获得特权* *(如通过替换一个关键的DLL),那么除此之外没有额外的特权和利益已提供给用户,也可能这个项目不应包含在CVE。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1123网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1123最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:惠普:hpsbux0110 - 170参考:网址:http://www.securityfocus.com/advisories/3585参考:惠普:hpsbux0112 - 177参考:网址:http://www.securityfocus.com/advisories/3723参考:报价:3399参考:网址:http://www.securityfocus.com/bid/3399参考:XF: openview-nmm-gain-privileges(7222)参考:网址:http://xforce.iss.net/static/7222.php参考:CERT-VN: VU # 782155参考:网址:http://www.kb.cert.org/vuls/id/782155漏洞在网络节点管理器(NNM) 6.2和更早的在惠普OpenView允许本地用户执行任意代码,通过缓冲区溢出可能在漫长的主机名或对象ID。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1123 3供应商确认:对咨询内容的决定:模糊的抽象:不确定为什么有两个独立的惠普警告,似乎包括相同的补丁和描述问题。后来咨询没有早一点的引用。有可能有两个独立的问题,但是它太很难说。MISC:补丁文件提供了更详细的问题。看到“PHSS_24842:“在URL:http://support.openview.hp.com/load.jsp?type=ov_patch&name=PHSS_25742投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1124网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1124最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:惠普:hpsbux0110 - 169参考:网址:http://www.securityfocus.com/advisories/3586参考:CIAC: m - 003参考:网址:http://www.ciac.org/ciac/bulletins/m - 003. shtml参考:XF: hp-rpcbind-dos(7221)参考:网址:http://xforce.iss.net/static/7221.php参考:报价:3400参考:网址:http://www.securityfocus.com/bid/3400rpcbind在hp - ux 11.00、11.04和11.11允许远程攻击者造成拒绝服务(核心转储)通过RPC请求portmap畸形,可能相关的缓冲区溢出。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1124 3供应商确认:对咨询内容的决定:模糊的惠普咨询是模糊的问题的原因,但报价显示,这可能是由于一个溢出。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1125网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1125最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011005赛门铁克实时更新攻击参考:网址:http://www.securityfocus.com/archive/1/218717参考:确认:http://www.sarc.com/avcenter/security/Content/2001.10.05.html参考:报价:3403参考:网址:http://www.securityfocus.com/bid/3403参考:XF: liveupdate-host-verification(7235)参考:网址:http://xforce.iss.net/static/7235.php赛门铁克实时更新1.6之前不使用加密来确保下载文件的完整性,它允许远程攻击者执行任意代码通过update.symantec.com站点的DNS欺骗。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1125 3供应商确认:对咨询内容的决定:SF-LOC抽象:CD: SF-LOC建议结合相同类型的问题在同一个版本,建议结合代码执行和DoS问题,因为两者都是由于DNS欺骗的问题。然而,DoS 1.6问题仍然存在,而代码执行并不因此CD: SF-LOC进一步表明分裂,因为有一个问题出现在一个版本而不是另一个。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1126网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1126最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011005赛门铁克实时更新攻击参考:网址:http://www.securityfocus.com/archive/1/218717参考:确认:http://www.sarc.com/avcenter/security/Content/2001.10.05.html参考:XF: liveupdate-host-verification(7235)参考:网址:http://xforce.iss.net/static/7235.php参考:报价:3413参考:网址:http://www.securityfocus.com/bid/3413赛门铁克实时更新1.4到1.6,可能以后的版本,允许远程攻击者造成拒绝服务(洪水)通过update.symantec.com站点的DNS欺骗。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1126 3供应商确认:对咨询内容的决定:SF-LOC抽象:CD: SF-LOC建议结合相同类型的问题在同一个版本,建议结合代码执行和DoS问题,因为两者都是由于DNS欺骗的问题。然而,DoS 1.6问题仍然存在,而代码执行并不因此CD: SF-LOC进一步表明分裂,因为有一个问题出现在一个版本而不是另一个。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1127网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1127最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011005进展数据库漏洞参考:网址:http://www.securityfocus.com/archive/1/218833参考:报价:3404参考:网址:http://www.securityfocus.com/bid/3404参考:XF: progress-strcpy-bo(7236)参考:网址:http://xforce.iss.net/static/7236.php缓冲区溢出在进行数据库8.3 d和9.1 c可以允许本地用户通过(1)_proapsv执行任意代码,(2)_mprosrv, (3) _mprshut, orarx (4), (5) sqlcpp, _probrkr (6), (7) _sqlschema和(8)_sqldump。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1127 3供应商确认:未知的内容决定:SF-EXEC, SF-LOC抽象:CD: SF-LOC表明,如果相同类型的问题出现在不同的版本中,他们应该分手。根据大参考,PROMSGS / PROTERMCAP文件的缓冲区溢出是固定的,而_proapsv _mprosrv /等。可执行文件。这些问题出现在不同的版本,所以他们应该分手即使他们是相同类型的问题。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1128网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1128最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011008项进展(protermcap)溢出和PROMSGS溢出参考:网址:http://www.securityfocus.com/archive/1/219174参考:XF: progress-protermcap-bo(7264)参考:网址:http://xforce.iss.net/static/7264.php参考:报价:3414参考:网址:http://www.securityfocus.com/bid/3414缓冲区溢出在进行数据库8.3 d和9.1 c允许本地用户执行任意代码通过长期条目指定的文件(1)或(2)PROTERMCAP PROMSGS环境变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1128 3供应商确认:未知的内容决定:SF-LOC抽象:CD: SF-LOC表明,如果相同类型的问题出现在不同的版本中,他们应该分手。根据大参考,PROMSGS / PROTERMCAP文件的缓冲区溢出是固定的,而_proapsv _mprosrv /等。可执行文件。这些问题出现在不同的版本,所以他们应该分手即使他们是相同类型的问题。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1129网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1129最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011102普洛古莱数据库PROMSGS格式字符串的问题。参考网址:http://www.securityfocus.com/archive/1/224395参考:报价:3502参考:网址:http://www.securityfocus.com/bid/3502参考:XF: progress-promsgs-format-string(7457)参考:网址:http://xforce.iss.net/static/7457.php(1)_probuild格式字符串漏洞,(2)_dbutil, (3) _mprosrv, _mprshut (4), (5) _proapsv, _progres (6), (7) _proutil, _rfutil(8)和(9)prolib进展数据库9.1 c允许本地用户执行任意代码通过使用的文件的格式字符串说明符PROMSGS环境变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1129 3供应商确认:未知的内容决定:SF-EXEC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1131网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1131最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:MISC:http://www.securiteam.com/windowsntfocus/5RP0L0055O.html目录遍历脆弱性WhitSoft发展SlimFTPd 2.2允许攻击者读取任意文件和目录通过…(修改后的点点)CD命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1131 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1133网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1133最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010821 BSDi(3.0/3.1)重启机器代码,任何用户(非特异性)参考:网址:http://www.securityfocus.com/archive/1/209192参考:XF: bsd-kernel-dos(7023)参考:网址:http://www.iss.net/security_center/static/7023.php参考:报价:3220参考:网址:http://www.securityfocus.com/bid/3220脆弱的系统调用BSDI 3.0和3.1允许本地用户造成拒绝服务(重启)在内核中通过一个特定的指令序列。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1133 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1134网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1134最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010720 Re:两只鸟有一个蠕虫参考:网址:http://www.securityfocus.com/archive/1/198381参考:BUGTRAQ: 20010809施乐N40打印机和红色代码蠕虫参考:网址:http://www.securityfocus.com/archive/1/203025参考:XF: xerox-docuprint-dos(6976)参考:网址:http://www.iss.net/security_center/static/6976.php参考:报价:3170参考:网址:http://online.securityfocus.com/bid/3170施乐DocuPrint N40打印机允许远程攻击者通过畸形引起拒绝服务数据,如红色代码蠕虫产生的。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1134 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1135网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1135最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010814 Fwd:合勤科技声望642路由器管理界面脆弱性参考:网址:http://www.securityfocus.com/archive/1/204439参考:BUGTRAQ: 20010810 Re:合勤科技声望642 r:管理服务公开在WAN默认密码参考:网址:http://www.securityfocus.com/archive/1/203592参考:BUGTRAQ: 20010809合勤科技声望642 r:管理服务公开在WAN默认密码参考:网址:http://www.securityfocus.com/archive/1/203022参考:BUGTRAQ: 20010918安全风险:合勤科技ADSL路由器642 r - WAN过滤器绕过从内部网络参考:网址:http://www.securityfocus.com/archive/1/214971参考:报价:3346参考:网址:http://www.securityfocus.com/bid/3346参考:XF: prestige-wan-bypass-filter(7146)参考:网址:http://xforce.iss.net/static/7146.php合勤科技声望642 r和642 i路由器不过滤路由器的Telnet、FTP端口外部广域网接口从内部访问,允许有人内部电脑上重新配置路由器,如果知道密码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1135 3供应商确认:未知discloser-claimed供应商确认在供应商网站上没有找到。然而大参考声称接触和尝试解决这个问题:http://www.securityfocus.com/archive/1/204439投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1136网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1136最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:惠普:hpsbux0109 - 166参考:网址:http://archives.neohapsis.com/archives/hp/2001-q3/0063.html参考:CIAC: l - 143参考:网址:http://www.ciac.org/ciac/bulletins/l - 143. shtml参考:XF: hp-virtualvault-libsecurity-dos(7124)参考:网址:http://xforce.iss.net/static/7124.php参考:报价:3338参考:网址:http://online.securityfocus.com/bid/3338libsecurity图书馆在hp - ux 11.04 (VVOS)允许攻击者造成拒绝服务。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1136 3供应商确认:对咨询内容的决定:模糊包含:CD:模糊的状态,这个问题是由一个含糊的标识应该包含在CVE供应商咨询,尽管引入错误的风险。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1137网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1137最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010906畸形分散包DoS Dlink防火墙/路由器参考:网址:http://www.securityfocus.com/archive/1/212532参考:XF: dlink-fragmented-packet-dos(7090)参考:网址:http://xforce.iss.net/static/7090.php参考:报价:3306参考:网址:http://online.securityfocus.com/bid/3306友讯科技di - 704互联网网关固件早于V2.56b6允许远程攻击者通过畸形引起拒绝服务(重启)IP数据报的片段。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1137 3供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1138网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1138最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010907 * * *安全顾问* * *力量HTML引用:网址:http://www.securityfocus.com/archive/1/212679参考:报价:3304参考:网址:http://www.securityfocus.com/bid/3304参考:XF: powerup-rcgi-directory-traversal(7092)参考:网址:http://xforce.iss.net/static/7092.php目录遍历r中的漏洞。pl的兰迪·帕克(又名r.cgi)启动HTML 0.8033 beta可能允许远程攻击者读取任意文件和执行任意代码通过一个. .(点点)文件中的参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1138 3供应商确认:未知的内容决定:EX-BETA包含:CD: EX-BETA表明β版本的程序应该被排除在CVE,除非他们“永久”测试。在这种情况下,程序已经可以在网站8月16日,2000年,应该是足够接近“永久”CVE的包容。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1139网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1139最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010822 (SNS咨询39号)WinWrapper专业2.0远程任意文件披露漏洞参考:网址:http://www.securityfocus.com/archive/1/209414参考:MISC:http://www.tsc.ant.co.jp/products/download.htm参考:报价:3219参考:网址:http://www.securityfocus.com/bid/3219参考:XF: winwrapper-dot-directory-traversal(7015)参考:网址:http://www.iss.net/security_center/static/7015.php目录遍历脆弱性ASCII NT WinWrapper专业允许远程攻击者读取任意文件通过一个. .(点点)在服务器的请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1139 3供应商确认:未知discloser-claimed确认:确认不能确定,因为产品的网页是在日本。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1140网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1140最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010822——[iSecureLabs BadBlue v1.02β为Windows 98,我2000咨询)——参考:网址:http://www.securityfocus.com/archive/1/209545参考:XF: badblue-file-source-disclosure(7021)参考:网址:http://xforce.iss.net/static/7021.php参考:报价:3222参考:网址:http://www.securityfocus.com/bid/3222BadBlue个人版v1.02β允许远程攻击者读取源代码可执行程序通过附加一个% 00(零字节)的请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1140 3供应商确认:未知discloser-claimed内容决定:EX-BETA投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1150网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1150最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010822 (SNS咨询范式)Trend Micro病毒克星(Ver.3.5x)远程引用:网址:http://www.securityfocus.com/archive/1/209375参考:BUGTRAQ: 20010824 (SNS咨询40)TrendMicro OfficeScan集团版ver.3.54远程读取文件的国际单位权威漏洞参考:网址:http://www.securityfocus.com/archive/1/210087参考:报价:3216参考:网址:http://www.securityfocus.com/bid/3216参考:XF: officescan-iuser-read-files(7014)参考:网址:http://www.iss.net/security_center/static/7014.php在cgiWebupdate脆弱性。exe Trend Micro OfficeScan企业版(即病毒克星)3.5.2通过3.5.4允许远程攻击者读取任意文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1150 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1151网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1151最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011015 (SNS咨询家)Trend Micro OfficeScan企业版(病毒克星企业版)参考:网址:http://www.securityfocus.com/archive/1/220666参考:MISC:http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=318参考:XF: officescan-config-file-access(7286)参考:网址:http://xforce.iss.net/static/7286.phpTrend Micro OfficeScan企业版(即病毒克星)3.53允许远程攻击者访问敏感信息从hotdownload目录没有身份验证,比如ofcscan。ini配置文件,其中包含一个弱加密的密码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1151 3供应商确认:未知的外国内容决策:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1152网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1152最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010905各种问题在巴尔的摩WebSweeper URL过滤参考:网址:http://www.securityfocus.com/archive/1/212283参考:MISC:http://www.mimesweeper.com/support/technotes/notes/1043.asp参考:报价:3296参考:网址:http://www.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3296巴尔的摩技术WEBsweeper 4.02,用于管理URL黑名单时,允许远程攻击者绕过黑名单限制和连接到未经授权的web服务器通过修改请求的URL,包括(1)/ /(双斜杠),(2)/子目录/ . .parentdir所需的文件在哪里,(3)/。/,或(4)url编码的字符。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1152 3供应商确认:没有争议内容决定:SECTOOL-DESIGN包含:技术报告的供应商指出,“这不是实际使用WEBsweeper黑名单管理。WEBsweeper的主要功能是网络流量的内容分析和不是设计成一个URL杀杀杀。”Since the software is not being used for its advertised purposes, perhaps this issue should not be included in CVE. ABSTRACTION: A similar vulnerability is described in CAN-2001-1026, but for that one, URL filtering is explicitly listed as a feature of that product. Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2001-1154 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1154最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010830可能拒绝服务与PHP和Cyrus IMAP BSDi 4.2参考:网址:http://www.securityfocus.com/archive/1/211056参考:报价:3260参考:网址:http://www.securityfocus.com/bid/3260参考:XF: cyrus-imap-php-dos(7053)参考:网址:http://xforce.iss.net/static/7053.php塞勒斯2.0.15、2.0.16 1.6.24 BSDi 4.2,启用了IMAP,允许远程攻击者造成拒绝服务(挂)使用PHP IMAP客户机。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1154 3供应商确认:没有搜索投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1156网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1156最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20011008 [ASGUARD-LABS] TYPSoft FTP服务器v0.95的/ RETR拒绝服务漏洞参考:网址:http://www.securityfocus.com/archive/1/219167参考:确认:http://membres.lycos.fr/typsoft/eng/history.html参考:报价:3409参考:网址:http://www.securityfocus.com/bid/3409参考:XF: typsoft-ftp-retr-stor-dos(7247)参考:网址:http://www.iss.net/security_center/static/7247.phpTYPSoft FTP 0.95允许远程攻击者造成拒绝服务(CPU消耗)通过“. . / . ./ *”参数(1)或(2)RETR的。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1156 3供应商确认:是的更新日志内容决定:SF-LOC确认:Typsoft历史文件,从“历史”按钮获得供应商的主页,包括一个描述0.97:“修复安全漏洞可以导致服务器崩溃,当一个用户做RETR . . / . ./ *”主页显示,这个版本是在3月1日,2002年,假设“火星”在法国是3月。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1157网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1157最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010812各种问题在巴尔的摩的WEBSweeper脚本过滤ing参考:网址:http://www.securityfocus.com/archive/1/203821参考:报价:3172参考:网址:http://www.securityfocus.com/bid/3172参考:报价:3173参考:网址:http://www.securityfocus.com/bid/3173巴尔的摩技术WEBsweeper 4.0和4.02从HTML页面不正确过滤Javascript,这可能允许远程攻击者绕过过滤通过(1)额外的领先<和一个或多个字符在脚本标记之前,或(2)标签使用Unicode。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1157 3供应商确认:未知的内容决定:SECTOOL-DESIGN, SF-LOC包含/抽象:类似于“/ Newsham纸IDS的局限性,这个特殊的攻击似乎利用端系统的特殊行为(在这种情况下,web客户端“宽容”的畸形的HTML)万博下载包,这可能被视为一个这种类型的设计限制的工具。因此,它应该考虑这种类型的问题是否应该被包括在CVE,如果是这样,whethere应该有一个单品的一般限制无论供应商/产品的数量,或多个项目,每个产品一个。这是一个新的CVE内容决定的基础上,CD: SECTOOL-DESIGN。抽象:它可以辩称,畸形的脚本标记和Unicode编码是不同类型的问题;因此,如果CD: SECTOOL-DESIGN是这样或那样的方式解决,投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION,或者提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1165网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1165最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:MISC:http://www.securemac.com/fileguard.php脱离参考:XF: fileguard-weak-password-encryption(7018)参考:网址:http://www.iss.net/security_center/static/7018.php参考:报价:3213参考:网址:http://www.securityfocus.com/bid/3213Intego FileGuard 4.0使用弱加密存储用户信息和密码,它允许本地用户获得特权解密信息,例如,脱离的工具。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1165 3供应商确认:确认:电子邮件查询发送到供应商,他不明白这个问题,或者没有仔细阅读securemac.com邮报。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1167网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1167最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:未知参考:惠普:hpsbux0108 - 165参考:网址:http://archives.neohapsis.com/archives/hp/2001-q3/0048.html脆弱性在/ opt /人口、难民和移民事务局/ bin惠普过程的资源管理器(人口、难民和移民事务局)C.01.08.2早些时候,允许本地用户获得根权限通过改变库或环境变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1167 3供应商确认:对咨询内容的决定:模糊包含:CD:模糊的状态,如果供应商承认或宣传,说,这是安全相关的问题,但是供应商是模糊的细节,还应该包括在内。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1168网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1168最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010829 eRisk安全顾问:PhpMyExplorer容易目录遍历。参考网址:http://archives.neohapsis.com/archives/bugtraq/2001-08/0408.html参考:BUGTRAQ: 20010830 Re: eRisk安全顾问:PhpMyExplorer容易目录遍历。参考网址:http://archives.neohapsis.com/archives/bugtraq/2001-08/0418.html目录遍历脆弱性指数。php在PhpMyExplorer 1.2.1允许远程攻击者读取任意文件通过一个. .% 2 f(修改点点)chemin参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1168 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1169网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1169最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010902 S /关键keyinit(1)身份验证(缺乏)+ sudo(1)参考:网址:http://archives.neohapsis.com/archives/bugtraq/2001-08/0441.htmlkeyinit在S /关键不需要身份验证来初始化一个一次性的密码序列,它允许攻击者获得权限的用户帐户创建新的一次性密码用于其他活动可以使用S /密钥身份验证,比如sudo。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1169 3供应商确认:内容决定:包容包容:后续的文章表明,如果攻击者获得了特权作为一个用户,那么攻击者可以实现相同的结果与其他方法不需要S /键,如键盘记录。所以有一些问题是否这个收益以外的任何额外的特权可用的打入账户。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1170网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1170最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010929脆弱性Amtote国际homebet自我服务赌博系统。参考网址:http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=217373&start=2001-09-27&end=2001-10-03参考:报价:3370参考:网址:http://www.securityfocus.com/bid/3370参考:XF: homebet-view-logfile(7186)参考:网址:http://xforce.iss.net/static/7186.phpAmTote国际homebet项目存储homebet。日志文件在homebet /虚拟目录,它允许远程攻击者窃取账户和密码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1170 3供应商确认:投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2001 - 1171网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2001 - 1171最终决定:阶段性裁决:修改:建议:20020315分配:20020315类别:科幻参考:BUGTRAQ: 20010907错误在编译部分旧版本的检查点防火墙参考:网址:http://archives.neohapsis.com/archives/bugtraq/2001-09/0046.html检查防火墙1 3.0 b通过4.0 SP1遵循符号链接并创建一个人人可写的临时. cpp文件编译策略规则时,这可能允许本地用户获得特权或修改防火墙策略。分析- - - - - - - - - - - - - - - - - ED_PRI - 2001 - 1171 3供应商确认:未知discloser-claimed投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:

页面最后更新或审查:2007年5月22日,