(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群ms - 2002 - 47的候选人



我提出集群ms - 2002由编辑委员会审查和投票。名称:ms - 2002 a描述:罐从微软报告从2002年8月到2003年2月大小:47通过修改这封邮件你可能投票的候选人投票,将它寄回给我,或通过使用CVE投票网站。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出的等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ====================================================== Candidate: CAN-2002-0692 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0692最终决定:阶段性裁决:修改:建议:20030317分配:20020712类别:科幻参考:MISC:http://lists.netsys.com/pipermail/full-disclosure/2002-September/002252.html参考:女士:ms02 - 053参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 053. - asp参考:XF: fpse-smarthtml-interpreter-dos(10194)参考:网址:http://www.iss.net/security_center/static/10194.php参考:XF: fpse-smarthtml-interpreter-bo(10195)参考:网址:http://www.iss.net/security_center/static/10195.php参考:报价:5804参考:网址:http://www.securityfocus.com/bid/5804缓冲区溢出在网页制作SmartHTML解释器(shtml.dll)服务器扩展(FPSE) 2000年和2002年允许远程攻击者造成拒绝服务(CPU消耗)或运行任意代码,分别通过一个特定类型的web文件请求。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 0692 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 0694网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0694最终决定:阶段性裁决:修改:建议:20030317分配:20020712类别:科幻参考:女士:ms02 - 055参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 055. - asp参考:XF: win-chm-code-execution(10254)参考:网址:http://www.iss.net/security_center/static/10254.phpHTML帮助在Microsoft Windows 98, 98年第二版,千禧年版,4.0元,4.0终端服务器版,Windows 2000, Windows XP使用本地计算机安全地带开立chm文件从Internet临时文件的文件夹,它允许远程攻击者通过HTML邮件引用或执行任意代码插入恶意chm文件包含快捷键,可以执行,即“通过HTML帮助文件编译代码的执行。”Analysis ---------------- ED_PRI CAN-2002-0694 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0696 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0696最终决定:阶段性裁决:修改:建议:20030317分配:20020712类别:科幻参考:女士:ms02 - 049参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 049. - asp参考:XF: ms-foxpro-app-execution(10035)参考:网址:http://www.iss.net/security_center/static/10035.php参考:报价:5633参考:网址:http://www.securityfocus.com/bid/5633微软全国计算机等级考试二级6.0不登记与ie的相关文件,它允许远程攻击者执行全国计算机等级考试二级通过HTML应用程序没有警告,引用精雕细琢文件名。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 0696 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 0864网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0864最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:BUGTRAQ: 20020916微软Windows XP远程桌面拒绝服务漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103235745116592&w=2参考:BUGTRAQ: 20020918微软Windows终端服务漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103236181522253&w=2参考:女士:ms02 - 051参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 051. - asp参考:XF: winxp-remote-desktop-dos(10120)参考:网址:http://www.iss.net/security_center/static/10120.php参考:报价:5713参考:网址:http://www.securityfocus.com/bid/5713远程数据协议(RDP)版本5.1在Microsoft Windows XP允许远程攻击者造成拒绝服务(崩溃)启用远程桌面时通过一个PDU确认活动数据包不设置模式BLT命令,又名“拒绝服务在远程桌面”。Analysis ---------------- ED_PRI CAN-2002-0864 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0865 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0865最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻/ CF / MP / SA / /未知参考:女士:ms02 - 052参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 052. - asp参考:XF: msvm-xml-methods-access(10135)参考:网址:http://www.iss.net/security_center/static/10135.php参考:报价:5752参考:网址:http://online.securityfocus.com/bid/5752某个类,支持XML(可扩展标记语言)在微软虚拟机(VM) 5.0.3805早些时候,暴露了某些不安全的方法,它允许远程攻击者执行不安全代码通过一个Java applet,又名“不恰当的方法在XML支持类。”Analysis ---------------- ED_PRI CAN-2002-0865 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0866 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0866最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:BUGTRAQ: 20020923技术漏洞固定MS-02-52参考信息:网址:http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html参考:女士:ms02 - 052参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 052. - asp参考:XF: msvm-jdbc-dll-execution(10133)参考:网址:http://www.iss.net/security_center/static/10133.php参考:报价:5751参考:网址:http://online.securityfocus.com/bid/5751Java数据库连接(JDBC)类在微软虚拟机(VM)包括5.0.3805允许远程攻击者加载和执行dll(动态链接库)通过一个Java applet com.ms.jdbc.odbc调用构造函数。JdbcOdbc与所需的DLL终止一个空字符串,又名“DLL通过JDBC类执行。”Analysis ---------------- ED_PRI CAN-2002-0866 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0867 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0867最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:女士:ms02 - 052参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 052. - asp参考:XF: msvm-jdbc-ie-dos(10134)参考:网址:http://www.iss.net/security_center/static/10134.php微软虚拟机(VM)包括构建5.0.3805允许远程攻击者造成拒绝服务(崩溃)的ie浏览器通过无效处理数据在Java applet,又名“处理验证缺陷。”Analysis ---------------- ED_PRI CAN-2002-0867 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1123 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1123最终决定:阶段性裁决:修改:建议:20030317分配:20020911类别:科幻参考:BUGTRAQ: 20020806上升2.5和相关vulns参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=102865925419469&w=2参考:BUGTRAQ: 20020807 MS SQL Server你好溢出极佳脚本参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=102873609025020&w=2参考:女士:ms02 - 056参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 056. - asp参考:XF: mssql-preauth-bo(9788)参考:网址:http://www.iss.net/security_center/static/9788.php参考:报价:5411参考:网址:http://online.securityfocus.com/bid/5411参考:XF: mssql-preauth-bo(9788)参考:网址:http://www.iss.net/security_center/static/9788.php缓冲区溢出在Microsoft SQL Server 2000的验证函数和微软桌面引擎(MSDE) 2000允许远程攻击者执行任意代码通过一个长请求TCP端口1433,又名“Hello”溢出。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1123 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1137网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1137最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:MISC:http://www.scan-associates.net/papers/foxpro.txt参考:女士:ms02 - 056参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 056. - asp缓冲区溢出在数据库控制台命令(DBCC)处理用户输入在Microsoft SQL Server 7.0和2000年,包括微软数据引擎(MSDE) 1.0 2000年微软桌面引擎(MSDE),允许攻击者执行任意代码通过一个长SourceDB参数在一个“非SQL OLEDB数据源”等技术的应用,可以的变种- 2002 - 0644。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1137 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1138网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1138最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:女士:ms02 - 056参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 056. - asp参考:XF: mssql-agent-create-files(10257)参考:网址:http://www.iss.net/security_center/static/10257.phpMicrosoft SQL Server 7.0和2000人,其中包括微软数据引擎(MSDE) 1.0 2000年微软桌面引擎(MSDE),写到输出文件安排工作根据自己的特权,而不是实体,启动,攻击者可以覆盖系统文件,又名“缺陷在输出文件处理预定的工作。”Analysis ---------------- ED_PRI CAN-2002-1138 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1139 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1139最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:女士:ms02 - 054参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 054. - asp参考:XF: win-zip-incorrect-path(10252)参考:网址:http://www.iss.net/security_center/static/10252.php参考:报价:5876参考:网址:http://www.securityfocus.com/bid/5876压缩文件夹功能在Microsoft Windows 98 + !包,Windows Me, Windows XP不正确检查在解压ZIP文件的目标文件夹,允许攻击者在一个已知的位置放置一个可执行文件在用户的系统上,又名“压缩文件解压不正确的目标路径。”Analysis ---------------- ED_PRI CAN-2002-1139 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1140 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1140最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:女士:ms02 - 057参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 057. - asp参考:XF: sfu-rpc-parameter-bo(10258)参考:网址:http://www.iss.net/security_center/static/10258.php参考:报价:5879参考:网址:http://www.securityfocus.com/bid/5879Sun Microsystems RPC图书馆服务为Unix 3.0 Interix SD, Microsoft Windows上实现NT4, 2000和XP,允许远程攻击者造成拒绝服务(服务挂)通过畸形包碎片,又名“不当参数大小检查导致拒绝服务。”Analysis ---------------- ED_PRI CAN-2002-1140 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1141 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1141最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:女士:ms02 - 057参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 057. - asp参考:XF: sfu-invalid-rpc-dos(10259)参考:网址:http://www.iss.net/security_center/static/10259.php参考:报价:5880参考:网址:http://www.securityfocus.com/bid/5880输入验证错误在Sun Microsystems RPC图书馆服务为Unix 3.0 Interix SD, Microsoft Windows上实现NT4, 2000和XP,允许远程攻击者通过畸形的分散导致拒绝服务RPC客户机包,又名“拒绝服务发送一个无效的RPC请求。”Analysis ---------------- ED_PRI CAN-2002-1141 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1142 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1142最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:女士:ms02 - 065参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 065. - asp基于堆的缓冲区溢出的远程数据服务(RDS)微软的组件的数据访问组件(MDAC) 2.1到2.6,6.0和Internet Explorer 5.01,允许远程攻击者执行代码通过一个畸形的HTTP请求数据的存根。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1142 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1179网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1179最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:NTBUGTRAQ: 20021010 Outlook Express远程代码执行在预览窗格中(S / MIME)参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103429637822920&w=2参考:NTBUGTRAQ: 20021010 Re:问题应用ms02 - 058参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103429681123297&w=2参考:BUGTRAQ: 20021010 Outlook Express远程代码执行在预览窗格中(S / MIME)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103435413105661&w=2参考:女士:ms02 - 058参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 058. - asp参考:XF: outlook-smime-bo(10338)参考:网址:http://www.iss.net/security_center/static/10338.php参考:报价:5944参考:网址:http://www.securityfocus.com/bid/5944缓冲区溢出的S / MIME解析能力在微软Outlook Express 5.5和6.0允许远程攻击者执行任意代码通过一个数字签名电子邮件具有悠久”从“地址,触发器溢出当用户视图或预览消息。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1179 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1180网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1180最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:女士:ms02 - 062参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 062. - asp参考:XF: iis-script-source-access-bypass(10504)参考:网址:http://www.iss.net/security_center/static/10504.php印刷错误的脚本访问权限来源互联网信息服务器(IIS) 5.0不正确排除。com文件,它允许攻击者只写权限上传恶意。com文件,又名“脚本源代码访问漏洞。”Analysis ---------------- ED_PRI CAN-2002-1180 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1182 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1182最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:VULNWATCH: 20021031 Microsoft Internet Information Server 5/5.1拒绝服务(# NISR31102002)参考:网址:http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0048.html参考:女士:ms02 - 062参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 062. - aspIIS 5.0和5.1允许远程攻击者造成拒绝服务(崩溃)通过畸形WebDAV请求导致大量的内存分配。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1182 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1183网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1183最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:女士:ms02 - 050参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 050. - aspMicrosoft Windows 98和Windows NT 4.0不正确验证数字证书的基本约束,允许远程攻击者执行代码,又名“新变种的证书验证缺陷可以使身份欺骗”(- 2002 - 0862)。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1183 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1184网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1184最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:CF参考:女士:ms02 - 064参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 064. - aspMicrosoft Windows 2000系统根文件夹的默认权限所有人组的完全访问(每个人:F),在搜索路径定位程序在登录或从桌面应用程序启动,这可能允许攻击者获得权限,其他用户通过木马程序。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1184 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1185网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1185最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:VULNWATCH: 20021211 PNG(便携式网络图形)缩小堆腐败漏洞参考:网址:http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0105.html参考:BUGTRAQ: 20021212 PNG(便携式网络图形)缩小堆腐败漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103970996205091&w=2参考:女士:ms02 - 066参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 066. - asp参考:XF: ie-png-bo(10662)参考:网址:http://www.iss.net/security_center/static/10662.php参考:报价:6216参考:网址:http://online.securityfocus.com/bid/6216Internet Explorer 5.01到6.0不正确检查某些参数的PNG文件打开它时,它允许远程攻击者造成拒绝服务(崩溃)通过触发出现基于堆的缓冲区溢出使用无效长度编码在减压,又名“畸形的PNG图像文件失败。”Analysis ---------------- ED_PRI CAN-2002-1185 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1186 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1186最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:BUGTRAQ: 20020903 MSIEv6 %编码导致问题再参考:网址:http://archives.neohapsis.com/archives/bugtraq/2002-09/0018.html参考:女士:ms02 - 066参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 066. - asp参考:XF: ie-sameoriginpolicy-bypass(10039)参考:网址:http://www.iss.net/security_center/static/10039.php参考:报价:5610参考:网址:http://online.securityfocus.com/bid/5610Internet Explorer 5.01到6.0不正确执行安全检查特定的编码字符在一个URL,可能允许远程攻击者窃取敏感信息从用户,将用户重定向到另一个网站,这些信息,又名“编码字符信息披露”。Analysis ---------------- ED_PRI CAN-2002-1186 1 Vendor Acknowledgement: yes advisory ACCURACY: Microsoft confirmed via email that this item addresses the specified Bugtraq post. Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1187 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1187最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:BUGTRAQ: 20020909谁陷害了Internet Explorer (GM # 010 - ie)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103158601431054&w=2参考:女士:ms02 - 066参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 066. - asp参考:XF: ie-frame-script-execution(10066)参考:网址:http://www.iss.net/security_center/static/10066.php参考:报价:5672参考:网址:http://online.securityfocus.com/bid/5672跨站点脚本漏洞(XSS)在Internet Explorer 5.01 6.0允许远程攻击者读取和执行文件在本地系统上通过web页面使用<框架>或< iframe >元素和javascript,又名“跨站脚本框架,”使用PrivacyPolicy演示。了解地理资源。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1187 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1188网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1188最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:BUGTRAQ: 20020912利用CROSS-PROTOCOL MSIE参考脚本:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103184415307193&w=2参考:女士:ms02 - 066参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 066. - asp参考:XF: ie-object-read-tif(10665)参考:网址:http://www.iss.net/security_center/static/10665.phpInternet Explorer 5.01到6.0允许远程攻击者识别Internet临时文件的文件夹的路径和饼干等获取用户信息通过一定的使用对象的标签,不接受适当的安全检查,又名“Internet临时文件的文件夹的名字读。”Analysis ---------------- ED_PRI CAN-2002-1188 1 Vendor Acknowledgement: yes advisory ACCURACY: Microsoft confirmed via email that this item addresses the specified Bugtraq post. Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1214 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1214最终决定:阶段性裁决:修改:建议:20030317分配:20021014类别:科幻参考:BUGTRAQ: 20020926微软PPTP服务器和客户端远程漏洞参考:网址:http://online.securityfocus.com/archive/1/293146参考:女士:ms02 - 063参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 063. - asp参考:XF: win-pptp-packet-bo(10199)参考:网址:http://www.iss.net/security_center/static/10199.php参考:报价:5807参考:网址:http://online.securityfocus.com/bid/5807缓冲区溢出在微软Windows XP和Windows 2000上PPTP服务允许远程攻击者可能导致拒绝服务(挂)和执行任意代码通过某种PPTP包与畸形的控制数据。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1214 1供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1230网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1230最终决定:阶段性裁决:修改:建议:20030317分配:20021021类别:科幻参考:MISC:http://getad.chat.ru/参考:MISC:http://www.packetstormsecurity.nl/filedesc/GetAd.c.html参考:女士:ms02 - 071参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 071. - asp参考:报价:5927参考:网址:http://online.securityfocus.com/bid/5927参考:XF: win-netdde-gain-privileges(10343)参考:网址:http://www.iss.net/security_center/static/10343.phpNetDDE代理在Windows NT 4.0、4.0终端服务器版,Windows 2000, Windows XP允许本地用户执行任意代码通过“粉碎”风格LocalSystem攻击通过发送WM_COPYDATA消息随后WM_TIMER消息,GetAd的经验显示,又名“缺陷在Windows WM_TIMER消息处理可以使特权提升。”Analysis ---------------- ED_PRI CAN-2002-1230 1 Vendor Acknowledgement: unknown Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1255 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1255最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:女士:ms02 - 067参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 067. - aspMicrosoft Outlook 2002允许远程攻击者造成拒绝服务(重复失败)通过电子邮件消息的某些无效的头字段访问使用POP3, IMAP,或WebDAV,又名“电子邮件标题处理缺陷可能导致Outlook 2002失败。”Analysis ---------------- ED_PRI CAN-2002-1255 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1256 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1256最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:女士:ms02 - 070参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 070. - aspSMB签名功能在服务器消息块(SMB)协议在Microsoft Windows 2000和Windows XP允许攻击者禁用数字签名设置在SMB会话迫使无符号发送的数据,然后将数据注入到会话没有检测,如通过修改组策略信息从一个域控制器。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1256 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1257网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1257最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - asp微软虚拟机(VM)包括构建5.0.3805允许远程攻击者执行任意代码,包括Java applet,调用COM(组件对象模型)对象在一个网站或一个HTML邮件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1257 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1260网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1260最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - aspJava数据库连接(JDBC) api在微软虚拟机(VM) 5.0.3805早些时候,允许远程攻击者绕过安全检查和访问数据库内容通过一个不可信的Java applet。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1260 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1262网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1262最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:BUGTRAQ: 20021125 RE: ms02 - 066修复漏洞和错误的语句引用:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103825484331857&w=2参考:NTBUGTRAQ: 20021125 Re: ms02 - 066修复漏洞和错误的语句引用:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103824668621672&w=2参考:女士:ms02 - 068参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 068. - asp参考:BUGTRAQ: 20021205笔记ms02 - 068,广泛的严重性轻描淡写参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103910416824172&w=2参考:NTBUGTRAQ: 20021205笔记ms02 - 068,广泛的严重性轻描淡写参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103909877717345&w=2Internet Explorer 5.5和6.0不执行完整的安全性检查外部缓存,它允许远程攻击者读取任意文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1262 1供应商确认:是的咨询准确性:虽然咨询是模糊的,微软已经证实,它解决了外部缓存问题。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1292网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1292最终决定:阶段性裁决:修改:建议:20030317分配:20021113类别:科幻参考:BUGTRAQ: 20021108技术应用补丁的Java女士漏洞信息参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103682630823080&w=2参考:NTBUGTRAQ: 20021108技术应用补丁的Java女士漏洞信息参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103684360031565&w=2参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - asp微软的Java虚拟机(VM)构建5.0.3805和早些时候,作为用于Internet Explorer,允许远程攻击者扩展标准的安全管理器(SSM)类(com.ms.security.StandardSecurityManager)和旁路StandardSecurityManager限制通过修改(1)或(2)deniedDefinitionPackages deniedAccessPackages设置,造成拒绝服务通过添加Java applet来阻止运行applet的列表。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1292 1供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1295网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1295最终决定:阶段性裁决:修改:建议:20030317分配:20021113类别:科幻参考:BUGTRAQ: 20021108技术应用补丁的Java女士漏洞信息参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103682630823080&w=2参考:NTBUGTRAQ: 20021108技术应用补丁的Java女士漏洞信息参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103684360031565&w=2参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - asp微软的Java实现,用于Internet Explorer、允许远程攻击者可能导致拒绝服务(崩溃)和开展其他未经授权的活动通过applet标签在HTML绕过Java类的限制(如私有构造函数)通过提供代码中的类名参数,即“不完整的Java对象实例化的弱点。”Analysis ---------------- ED_PRI CAN-2002-1295 1 Vendor Acknowledgement: unknown Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1325 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1325最终决定:阶段性裁决:修改:建议:20030317分配:20021126类别:科幻参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - asp参考:报价:6380参考:网址:http://online.securityfocus.com/bid/6380微软虚拟机(VM)构建5.0.3805早些时候,允许远程攻击者通过一个Java小程序确定本地用户的用户名访问用户。dir系统属性,即“用户。dir暴露弱点。”Analysis ---------------- ED_PRI CAN-2002-1325 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2003-0002 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0002最终决定:阶段性裁决:修改:建议:20030317分配:20030102类别:科幻参考:BUGTRAQ: 20021007微软内容管理服务器上的CSS参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103417794800719&w=2参考:女士:ms03 - 002参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 002. - asp参考:报价:5922参考:网址:http://online.securityfocus.com/bid/5922参考:XF: mcms-manuallogin-reasontxt-xss(10318)参考:网址:http://www.iss.net/security_center/static/10318.php跨站点脚本(XSS) ManualLogin脆弱性。微软的asp脚本内容管理服务器(反水雷舰)2001年允许远程攻击者通过REASONTXT参数执行任意脚本。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0002 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0004网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0004最终决定:阶段性裁决:修改:建议:20030317分配:20030102类别:科幻参考:女士:ms03 - 005参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 005. - asp参考:XF: winxp-windows-redirector-bo(11260)参考:网址:http://www.iss.net/security_center/static/11260.php缓冲区溢出在Windows转向器函数在Microsoft Windows XP允许本地用户执行任意代码通过一个长参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0004 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0007网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0007最终决定:阶段性裁决:修改:建议:20030317分配:20030102类别:科幻参考:女士:ms03 - 003参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 003. - aspMicrosoft Outlook 2002不妥善处理请求加密电子邮件与V1 Exchange服务器安全证书,导致前景以明文发送邮件,又名“缺陷在Outlook 2002如何处理V1 Exchange服务器安全证书可能导致信息披露。”Analysis ---------------- ED_PRI CAN-2003-0007 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2003-0009 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0009最终决定:阶段性裁决:修改:建议:20030317分配:20030102类别:科幻参考:女士:ms03 - 006参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 006. - asp我参考:BUGTRAQ: 20030227 ms windows IE /前景/ HelpCenter关键漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104636383018686&w=2参考:XF: winme-hsc-hcp-bo(11425)参考:网址:http://www.iss.net/security_center/static/11425.php跨站点脚本(XSS)脆弱性在帮助和支持中心Microsoft Windows我允许远程攻击者在本地计算机上执行任意脚本安全上下文通过hcp: / /恶意脚本的URL参数的主题。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0009 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 1326网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 1326最终决定:阶段性裁决:修改:建议:20030317分配:20030206类别:科幻参考:女士:ms03 - 004参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 004. - asp参考:XF: ie-dialog-zone-bypass(11258)参考:网址:http://www.iss.net/security_center/static/11258.php微软Internet Explorer 5.01, 5.5和6.0允许远程攻击者绕过跨域安全模型通过对话框运行恶意脚本或任意程序,又名“不当跨域安全验证对话框”。Analysis ---------------- ED_PRI CAN-2003-1326 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2003-1328 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 1328最终决定:阶段性裁决:修改:建议:20030317分配:20030206类别:科幻参考:女士:ms03 - 004参考:网址:http://www.microsoft.com/technet/security/bulletin/ms03 - 004. - asp参考:XF: ie-showhelp-zone-bypass(11259)参考:网址:http://www.iss.net/security_center/static/11259.phpshowHelp()函数在Microsoft Internet Explorer 5.5和6.0支持某些类型的可插协议允许远程攻击者绕过跨域安全模型和运行任意代码的情况,又名“不当跨域安全验证showHelp功能。”Analysis ---------------- ED_PRI CAN-2003-1328 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0693 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0693最终决定:阶段性裁决:修改:建议:20030317分配:20020712类别:科幻参考:BUGTRAQ: 20021003缓冲区溢出在IE /前景HTML帮助参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103365849505409&w=2参考:BUGTRAQ: 20021009托尔Larholm安全顾问TL # 004参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103419115517344&w=2参考:BUGTRAQ: 20021010验证代码的windows帮助溢出概念参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103435279404182&w=2参考:女士:ms02 - 055参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 055. - asp参考:XF: win-html-help-bo(10253)参考:网址:http://www.iss.net/security_center/static/10253.php参考:报价:5874参考:网址:http://www.securityfocus.com/bid/5874缓冲区溢出在HTML帮助ActiveX控件(hhctrl.ocx)在Microsoft Windows 98, 98年第二版,千禧年版,4.0元,4.0终端服务器版,Windows 2000, Windows XP允许远程攻击者通过(1)执行代码很长Alink函数参数,或(2)脚本包含showHelp长参数函数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 0693 3供应商确认:对咨询内容的决定:SF-LOC抽象:微软通过电子邮件声明,这两个问题是固定的,他们跟踪代码相同的脆弱。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 0862网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0862最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:BUGTRAQ: 20020805 IE SSL脆弱性参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=102866120821995&w=2参考:BUGTRAQ: 20020812 IE SSL利用参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=102918200405308&w=2参考:BUGTRAQ: 20020819客户端证书验证不足在IIS 5.0 pre sp3参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=102976967730450&w=2参考:女士:ms02 - 050参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 050. - aspCertGetCertificateChain (1), (2) CertVerifyCertificateChainPolicy,和(3)WinVerifyTrust api在CryptoAPI微软产品,包括Microsoft Windows 98 XP,办公室Mac, Internet Explorer Mac,和Mac的Outlook Express,不正确验证的基本约束中间由ca签名的证书时,远程攻击者可以恶搞可信站点的证书通过SSL会话的中间人攻击,为Internet Explorer和IIS最初报道。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 0862 3供应商确认:对咨询内容的决定:SF-LOC抽象:- 2002 - 0828是一个早期的报告这个问题(由于non-coordinated发现)。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 0863网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0863最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:BUGTRAQ: 20020916 Microsoft Windows远程桌面协议校验和和击键参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103235960119404&w=2参考:BUGTRAQ: 20020918微软Windows终端服务漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103236181522253&w=2参考:女士:ms02 - 051参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 051. - asp参考:XF: win-rdp-checksum-leak(10121)参考:网址:http://www.iss.net/security_center/static/10121.php远程数据协议(RDP) 5.0版本的Microsoft Windows 2000和5.1 RDP Windows XP不加密明文会话数据的校验和,这可能允许远程攻击者确定加密会话的内容通过嗅探,又名“弱加密在RDP协议。”Analysis ---------------- ED_PRI CAN-2002-0863 3 Vendor Acknowledgement: yes advisory Content Decisions: DESIGN-WEAK-ENCRYPTION Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-0869 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 0869最终决定:阶段性裁决:修改:建议:20030317分配:20020815类别:科幻参考:MISC:http://www.li0n.pe.kr/eng/advisory/ms/iis_impersonation.txt参考:VULNWATCH: 20021104 (A3SC)女士IIS进程外特权高度脆弱性(a3cr@k - vul - 2002 - 06 - 002)参考:网址:http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0059.html参考:BUGTRAQ: 20021104 (A3SC)女士IIS进程外特权高度脆弱性(a3cr@k - vul - 2002 - 06 - 002)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103642839205574&w=2参考:女士:ms02 - 062参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 062. - asp参考:XF: iis-outofprocess-privilege-elevation(10502)参考:网址:http://www.iss.net/security_center/static/10502.php举办过程中未知的漏洞(dllhost.exe)通过Microsoft Internet Information Server (IIS) 4.0 5.1允许远程攻击者获得特权通过执行过程的应用程序获得LocalSystem特权,又名“特权高程的过程。”Analysis ---------------- ED_PRI CAN-2002-0869 3 Vendor Acknowledgement: yes advisory Content Decisions: VAGUE Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1145 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1145最终决定:阶段性裁决:修改:建议:20030317分配:20020923类别:科幻参考:BUGTRAQ: 20021017 Microsoft SQL Server Webtasks特权升级(# NISR17102002)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103487044122900&w=2参考:NTBUGTRAQ: 20021017 Microsoft SQL Server Webtasks特权升级(# NISR17102002)参考:网址:http://marc.theaimsgroup.com/?l=ntbugtraq&m=103486356413404&w=2参考:MISC:http://www.nextgenss.com/advisories/mssql-webtasks.txt参考:女士:ms02 - 061参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 061. - asp参考:XF: mssql-webtask-gain-privileges(10388)参考:网址:http://www.iss.net/security_center/static/10388.php参考:报价:5980参考:网址:http://www.securityfocus.com/bid/5980xp_runwebtask存储过程Web任务组件的Microsoft SQL Server 7.0和2000年,微软数据引擎(MSDE) 1.0,和微软桌面引擎可以执行的公共(MSDE) 2000,攻击者可以获得特权通过更新webtask所拥有的数据库通过msdb.dbo所有者。mswebtasks表,没有强大的权限。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1145 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1181网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1181最终决定:阶段性裁决:修改:建议:20030317分配:20021004类别:科幻参考:BUGTRAQ: 20021105 (SNS咨询No.58) Microsoft IIS当地跨站点脚本漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103651224215736&w=2参考:MISC:http://www.lac.co.jp/security/intelligence/SNSAdvisory/58.html参考:女士:ms02 - 062参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 062. - asp参考:XF: iis-admin-pages-xss(10501)参考:网址:http://www.iss.net/security_center/static/10501.php多个跨站点脚本(XSS)在管理网页漏洞为Microsoft Internet Information Server (IIS) 4.0 5.1允许远程攻击者执行HTML脚本,其他用户通过(1)一个ASP文件IISHELP虚拟目录,或(2)可能是其他未知的攻击向量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1181 3供应商确认:对咨询内容的决定:SF-LOC抽象/准确性:微软咨询暗指多个XSS问题,但SNS咨询只给一个特定的攻击向量。由于缺乏细节的微软咨询,目前尚不清楚是否存在其他页面或攻击向量。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2002 - 1254网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1254最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:BUGTRAQ: 20021022脆弱的缓存对象即(1)9报告参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=103530131201191&w=2参考:MISC:http://security.greymagic.com/adv/gm012-ie/参考:女士:ms02 - 066参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 066. - aspInternet Explorer 5.5和6.0允许远程攻击者绕过跨域安全模型和访问信息在本地系统上或在其他领域,并有可能执行代码,通过缓存的方法和对象,又名“跨域验证通过缓存的方法。”Analysis ---------------- ED_PRI CAN-2002-1254 3 Vendor Acknowledgement: yes advisory Content Decisions: VAGUE ACCURACY: Microsoft confirmed via email that this item addresses the specified Bugtraq post. Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2002-1258 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1258最终决定:阶段性裁决:修改:建议:20030317分配:20021104类别:科幻参考:女士:ms02 - 069参考:网址:http://www.microsoft.com/technet/security/bulletin/ms02 - 069. - asp两个漏洞在微软虚拟机(VM)包括构建5.0.3805,用于Internet Explorer和其他应用程序,允许远程攻击者读取文件通过一个Java applet的欺骗在代码中的位置参数applet标签,可能由于解析错误。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1258 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:

页面最后更新或审查:2007年5月22日,