(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

(提案)集群unix - 2003 - 35的候选人



我提出集群unix - 2003 a,供编辑部评论和投票。名称:unix - 2003描述:罐在Linux中报告从2003年1月到2003年3月大小:35通过修改这封邮件你可能投票的候选人投票,将它寄回给我,或通过使用CVE投票网站。中列出的候选人优先秩序。优先级1和优先级2的候选人都应对不同层次的供应商确认,所以他们应该易于检查和可以信任的,是真实的问题。总结的选票使用(“严重程度”的按升序)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -接受——选民接受候选人提出的等待——选民对候选人没有意见修改选民想要改变一些小细节(例如参考/描述)审查-选民正在审查/研究候选人,或需要更多的信息,重塑候选人必须大幅修改,如分割或合并拒绝候选人不是“漏洞”,或重复等。1)请写你的投票在直线上,从“投票:”开始。如果你想添加评论或细节,在投票后将它们添加到线:线。2)如果你看到任何失踪的引用,请提及他们,使他们可以包括在内。在映射引用帮助极大。3)请注意,“修改”被视为一个“接受”当计算选票。所以如果你没有足够的信息对候选人但你不想等待,使用一个回顾。 ********** NOTE ********** NOTE ********** NOTE ********** NOTE ********** Please keep in mind that your vote and comments will be recorded and publicly viewable in the mailing list archives or in other formats. ====================================================== Candidate: CAN-2002-1509 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2002 - 1509最终决定:阶段性裁决:修改:建议:20030317分配:20030213类别:科幻参考:确认:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=75418参考:REDHAT: RHSA-2003:057参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 057. - html参考:曼德拉草:MDKSA-2003:026参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:026shadow-utils 20000902 - 7的一个补丁会导致useradd命令来创建一个邮件spool文件读/写权限的新用户组(660年模式),它允许在同一组内的其他用户读取或修改新用户的传入的电子邮件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2002 - 1509 1供应商确认:是的补丁投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0012网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0012最终决定:阶段性裁决:修改:建议:20030317分配:20030106类别:科幻参考:BUGTRAQ: 20030102 (BUGZILLA)安全顾问——远程数据库密码公开引用:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104154319200399&w=2参考:DEBIAN: dsa - 230参考:网址:http://www.debian.org/security/2003/dsa - 230参考:报价:6502参考:网址:http://online.securityfocus.com/bid/6502Bugzilla 2.14数据收集脚本。2.16 x 2.14.5之前,。2.17 x 2.16.2之前,。x之前2.17.3人人可写的权限数据/矿业目录当它运行时,它允许本地用户修改或删除数据。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0012 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0013网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0013最终决定:阶段性裁决:修改:建议:20030317分配:20030106类别:CF参考:BUGTRAQ: 20030102 (BUGZILLA)安全顾问——远程数据库密码公开引用:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104154319200399&w=2参考:DEBIAN: dsa - 230参考:网址:http://www.debian.org/security/2003/dsa - 230参考:报价:6501参考:网址:http://online.securityfocus.com/bid/6501默认为Bugzilla 2.14 . htaccess脚本。2.16 x 2.14.5之前,。2.17 x 2.16.2之前,。x之前2.17.3不包括文件名localconfig文件的备份副本,由如vi和Emacs的编辑器,这可能允许远程攻击者获得直接访问密码的数据库备份文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0013 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0018网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0018最终决定:阶段性裁决:修改:建议:20030317分配:20030107类别:科幻参考:REDHAT: RHSA-2003:025参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 025. - html参考:曼德拉草:MDKSA-2003:014参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:014参考:XF: linux-odirect-information-leak(11249)参考:网址:http://www.iss.net/security_center/static/11249.phpLinux内核2.4.10通过2.4.21-pre4不妥善处理O_DIRECT特性,它允许本地攻击者与先前删除文件的写权限阅读部分,或导致文件系统损坏。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0018 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0019网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0019最终决定:阶段性裁决:修改:建议:20030317分配:20030107类别:科幻参考:REDHAT: RHSA-2003:056参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 056. - html参考:XF: linux-umlnet-gain-privileges(11276)参考:网址:http://www.iss.net/security_center/static/11276.phpuml_net在Red Hat Linux 8.0的kernel-utils包不正确的setuid root特权,它允许本地用户修改网络接口,例如通过修改ARP条目或将接口为混杂模式。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0019 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0032网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0032最终决定:阶段性裁决:修改:建议:20030317分配:20030112类别:科幻参考:BUGTRAQ: 20030103多个libmcrypt漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104162752401212&w=2参考:BUGTRAQ: 20030105 GLSA: libmcrypt参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104188513728573&w=2参考:DEBIAN: dsa - 228参考:网址:http://www.debian.org/security/2003/dsa - 228参考:CONECTIVA: CLA-2003:567参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000567参考:SUSE: SuSE-SA: 2003:0010内存泄漏在libmcrypt 2.5.5允许攻击者造成拒绝服务(内存耗尽)通过大量的请求应用程序,导致通过libtool libmcrypt动态加载算法。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0032 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0033网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0033最终决定:阶段性裁决:修改:建议:20030317分配:20030115类别:科幻参考:国际空间站:20030303 Snort RPC预处理脆弱性参考:网址:http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951参考:BUGTRAQ: 20030303 Snort RPC漏洞(fwd)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104673386226064&w=2参考:曼德拉草:MDKSA-2003:029参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:029参考:ENGARDE: esa - 20030307 - 007参考:网址:http://www.linuxsecurity.com/advisories/engarde_advisory - 2944. - html参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104705626227740&w=2参考:BUGTRAQ: 20030307 GLSA: snort(200303 - 6.1)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104716001503409&w=2参考:XF: snort-rpc-fragment-bo(10956)参考:网址:http://www.iss.net/security_center/static/10956.php缓冲区溢出的RPC预处理Snort 1.8和1.9。x之前1.9.1允许远程攻击者通过分散的RPC包执行任意代码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0033 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0039网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0039最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:BUGTRAQ: 20030115 DoS对DHCP基础设施与isc dhcrelay参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104310927813830&w=2参考:DEBIAN: dsa - 245参考:网址:http://www.debian.org/security/2003/dsa - 245参考:BUGTRAQ: 20030219 [OpenPKG - sa - 2003.012] OpenPKG安全咨询了dhcpd)(参考:网址:http://www.openpkg.org/security/openpkg - sa - 2003.012 dhcpd.htmlISC dhcrelay (dhcp-relay) 3.0 rc9早些时候,可能还有其他版本,允许远程攻击者造成拒绝服务(包风暴)通过一定的BOOTP数据包转发广播MAC地址,导致无限循环是不受限制的跳数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0039 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0040网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0040最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:DEBIAN: dsa - 247参考:网址:http://www.debian.org/security/2003/dsa - 247SQL注入漏洞在PostgreSQL 0.40和更早的身份验证模块快递允许远程攻击者通过用户名执行的SQL代码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0040 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0042网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0042最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:BUGTRAQ: 20030130 Apache Jakarta Tomcat 3 URL解析漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104394568616290&w=2参考:VULNWATCH: 20030130 Apache Jakarta Tomcat 3 URL解析漏洞参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt参考:DEBIAN: dsa - 246参考:网址:http://www.debian.org/security/2003/dsa - 246Jakarta Tomcat 3.3.1a之前,在使用JDK 1.3.1或更早,甚至允许远程攻击者列出目录索引。html或其他文件,或获取未经加工的JSP文件的源代码,通过一个包含null字符的URL。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0042 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0043网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0043最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt参考:DEBIAN: dsa - 246参考:网址:http://www.debian.org/security/2003/dsa - 246Jakarta Tomcat 3.3.1a之前,在使用JDK 1.3.1或更早,当处理web使用受信任的特权。xml文件,它可能允许远程攻击者通过网络阅读部分的一些文件。xml文件。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0043 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0044网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0044最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/参考:确认:http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt参考:DEBIAN: dsa - 246参考:网址:http://www.debian.org/security/2003/dsa - 246跨站点脚本(XSS)漏洞的例子(1)和(2)根为Jakarta Tomcat web应用程序3。通过3.3.1a x允许远程攻击者执行任意web脚本。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0044 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0070网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0070最终决定:阶段性裁决:修改:建议:20030317分配:20030204类别:科幻参考:VULNWATCH: 20030224终端模拟器安全问题参考:网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html参考:BUGTRAQ: 20030224终端模拟器安全问题参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2参考:REDHAT: RHSA-2003:053参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 053. - html参考:BUGTRAQ: 20030303 GLSA:静脉血栓栓塞(200303 - 2)参考:XF: terminal-emulator-window-title(11414)参考:网址:http://www.iss.net/security_center/static/11414.php静脉血栓栓塞,因为默认情况下用于gnome终端终端模拟器2.2和2.0在gnome终端作为一个选项,允许攻击者修改窗口标题通过一个特定的字符转义序列,然后插入的命令行用户的终端,例如当用户视图包含恶意的文件序列,这可能允许攻击者执行任意命令。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0070 1供应商确认:是的咨询准确性:影响版本确认通过电子邮件Red Hat的马克•考克斯。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0073网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0073最终决定:阶段性裁决:修改:建议:20030317分配:20030204类别:科幻参考:确认:http://www.mysql.com/doc/en/万博下载包News-3.23.55.html参考:曼德拉草:MDKSA-2003:013参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:013参考:BUGTRAQ: 20030129 [OpenPKG - sa - 2003.008] OpenPKG安全顾问(mysql)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104385719107879&w=2参考:ENGARDE: esa - 20030220 - 004参考:网址:http://www.linuxsecurity.com/advisories/engarde_advisory - 2873. - html参考:XF: mysql-mysqlchangeuser-doublefree-dos(11199)参考:网址:http://www.iss.net/security_center/static/11199.php双重释放脆弱性mysqld MySQL之前与MySQL 3.23.55允许攻击者访问引起拒绝服务通过mysql_change_user(崩溃)。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0073 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0078网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0078最终决定:阶段性裁决:修改:建议:20030317分配:20030210类别:科幻参考:确认:http://www.openssl.org/万博下载包news/secadv_20030219.txt参考:BUGTRAQ: 20030219 OpenSSL 0.9.7 a和0.9.6i发布参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104567627211904&w=2参考:BUGTRAQ: 20030219 [OpenPKG - sa - 2003.013] OpenPKG安全顾问(openssl)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104568426824439&w=2参考:ENGARDE: esa - 20030220 - 005参考:网址:http://www.linuxsecurity.com/advisories/engarde_advisory - 2874. - html参考:BUGTRAQ: 20030220 GLSA: openssl(200302 - 10)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104577183206905&w=2参考:BUGTRAQ: 20030220 tslsa - 2003 - 0005 - openssl参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104586094920848&w=2参考:曼德拉草:MDKSA-2003:020参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:020参考:DEBIAN: dsa - 253参考:网址:http://www.debian.org/security/2003/dsa - 253参考:FREEBSD: FreeBSD-SA-03:02参考:CONECTIVA: CLSA-2003:570参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000570参考:SUSE: SuSE-SA: 2003:011参考:NETBSD: NETBSD - sa2003 - 001参考:XF: ssl-cbc-information-leak(11369)参考:网址:http://www.iss.net/security_center/static/11369.phpssl3_get_record s3_pkt。c之前OpenSSL 0.9.7 a和0.9.6 0.9.6i之前不执行MAC计算如果使用不正确的分组密码填充,导致信息泄漏(时间差异),可能会使它更容易启动密码攻击依赖于区分填充和MAC验证错误,可能导致提取原始明文的,又称“Vaudenay时机攻击。”Analysis ---------------- ED_PRI CAN-2003-0078 1 Vendor Acknowledgement: yes advisory Voting Section -------------- Possible votes: ACCEPT/MODIFY/NOOP/REVIEWING/RECAST/REJECT If ACCEPT or MODIFY, include reason for acceptance: VERIFIED-BY-MY-ORG, ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST, HAS-INDEPENDENT-CONFIRMATION, or provide other reason. VOTE: ACCEPT_REASON: COMMENTS: ====================================================== Candidate: CAN-2003-0081 URL:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0081最终决定:阶段性裁决:修改:建议:20030317分配:20030210类别:科幻参考:MISC:http://www.guninski.com/etherre.html参考:确认:http://www.ethereal.com/appnotes/enpa - sa - 00008. - html参考:BUGTRAQ: 20030308的格式字符串错误,但仍然飘渺的比windows参考:DEBIAN: dsa - 258参考:网址:http://www.debian.org/security/2003/dsa - 258在packet-socks格式字符串漏洞。c的袜子析像飘渺的0.8.7通过0.9.9允许远程攻击者执行任意代码通过袜子包包含格式说明符字符串。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0081 1供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0093网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0093最终决定:阶段性裁决:修改:建议:20030317分配:20030212类别:科幻参考:MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585参考:REDHAT: RHSA-2003:033参考:网址:http://rhn.redhat.com/errata/rhsa - 2003 - 033. - html参考:DEBIAN: dsa - 261参考:网址:http://www.debian.org/security/2003/dsa - 261tcpdump的半径解码器操作和早些时候允许远程攻击者造成拒绝服务(崩溃)通过一个无效的半径数据包报头字段长度为0,从而导致tcpdump生成数据在一个无限循环。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0093 1供应商确认:是的投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0094网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0094最终决定:阶段性裁决:修改:建议:20030317分配:20030214类别:科幻参考:曼德拉草:MDKSA-2003:016参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:016一个补丁的mcookie util-linux包Mandrake Linux 8.2和9.0使用/dev/urandom /dev/random,反而导致mcookie使用熵源比预期更容易预测,这可能会让某些类型的攻击更容易成功。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0094 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0102网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0102最终决定:阶段性裁决:修改:建议:20030317分配:20030225类别:科幻参考:BUGTRAQ: 20030304 iDEFENSE安全顾问03.04.03:本地文件(1)引用的可利用的缓冲区溢出:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104680706201721&w=2参考:MISC:http://www.idefense.com/advisory/03.04.03.txt参考:REDHAT: RHSA-2003:086参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 086. - html参考:NETBSD: NETBSD - sa2003 - 003参考:网址:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd sa2003 txt.asc——003.参考:DEBIAN: dsa - 260参考:网址:http://www.debian.org/security/2003/dsa - 260readelf tryelf缓冲区溢出()。c文件的命令允许攻击者执行任意代码的用户运行文件,可能通过一个大的实体大小值在一个ELF头(elfhdr.e_shentsize)。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0102 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0108网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0108最终决定:阶段性裁决:修改:建议:20030317分配:20030226类别:科幻参考:BUGTRAQ: 20030227 iDEFENSE安全顾问02.27.03:TCPDUMP拒绝服务漏洞在ISAKMP包Parsin参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104637420104189&w=2参考:MISC:http://www.idefense.com/advisory/02.27.03.txt参考:DEBIAN: dsa - 255参考:网址:http://www.debian.org/security/2003/dsa - 255参考:曼德拉草:MDKSA-2003:027参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027参考:SUSE: SuSE-SA: 2003:0015参考:网址:http://www.suse.de/de/security/2003_015_tcpdump.html参考:BUGTRAQ: 20030304 [OpenPKG - sa - 2003.014] OpenPKG安全顾问(tcpdump)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104678787109030&w=2参考:XF: tcpdump-isakmp-dos(11434)参考:网址:http://www.iss.net/security_center/static/11434.phpisakmp_sub_print tcpdump 3.6通过3.7.1允许远程攻击者造成拒绝服务(CPU消耗)通过某种畸形ISAKMP UDP端口500包,导致tcpdump进入一个无限循环。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0108 1供应商确认:未知投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0120网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0120最终决定:阶段性裁决:修改:建议:20030317分配:20030228类别:科幻参考:DEBIAN: dsa - 256参考:网址:http://www.debian.org/security/2003/dsa - 256参考:XF: mhc-adb2mhc-insecure-tmp(11439)参考:网址:http://www.iss.net/security_center/static/11439.phpadb2mhc前mhc-utils包0.25 + 20010625 - 7.1允许本地用户覆盖任意文件通过一个符号链接攻击一个默认的临时diectory和可预测的名称。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0120 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0143网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0143最终决定:阶段性裁决:修改:建议:20030317分配:20030313类别:科幻参考:BUGTRAQ: 20030310 QPopper 4.0。x缓冲区溢出漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104739841223916&w=2参考:BUGTRAQ: 20030312 Re: QPopper 4.0。x缓冲区溢出漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104748775900481&w=2参考:DEBIAN: dsa - 259参考:网址:http://www.debian.org/security/2003/dsa - 259参考:BUGTRAQ: 20030314 [OpenPKG - sa - 2003.018] OpenPKG安全顾问(qpopper)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104768137314397&w=2参考:BUGTRAQ: 20030317 GLSA: qpopper(200303 - 12)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104792541215354&w=2在qpopper 4.0 pop_msg函数。x 4.0.5fc2之前不空终止调用Qvsnprintf消息缓冲之后,这可能允许经过身份验证的用户执行任意代码通过一个缓冲区溢出在mdef命令长宏的名字。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0143 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0144网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0144最终决定:阶段性裁决:修改:建议:20030317分配:20030313类别:科幻参考:BUGTRAQ: 20030305潜在的缓冲区溢出lprm (fwd)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104690434504429&w=2参考:BUGTRAQ: 20030308 OpenBSD lprm:(1)利用参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104714441925019&w=2参考:确认:ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch参考:SUSE: SuSE-SA: 2003:0014参考:网址:http://www.suse.de/de/security/2003_014_lprold.html在lprm命令缓冲区溢出lprold lpr包在SuSE 7.1到7.3,OpenBSD 3.2和更早的,可能还有其他操作系统,允许本地用户获得根权限通过长命令行参数,如(1)请求ID或(2)用户名。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0144 1供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0087网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0087最终决定:阶段性裁决:修改:建议:20030317分配:20030210类别:科幻参考:BUGTRAQ: 20030212 iDEFENSE安全顾问02.12.03:在AIX libIM缓冲区溢出。参考网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104508375107938&w=2参考:VULNWATCH: 20030212 iDEFENSE安全顾问02.12.03:在AIX libIM缓冲区溢出。参考网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0066.html参考:BUGTRAQ: 20030212 libIM。一个缓冲区溢出漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104508833214691&w=2参考:MISC:http://www.idefense.com/advisory/02.12.03.txt参考:AIXAPAR: IY40307参考:AIXAPAR: IY40317参考:AIXAPAR: IY40320缓冲区溢出libIM图书馆(libIM.a)国家语言支持(NLS)在AIX 4.3通过5.2允许本地用户获得特权通过几个可能的攻击向量,包括一个长aixterm im参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0087 2供应商确认:是的咨询投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0025网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0025最终决定:阶段性裁决:修改:建议:20030317分配:20030110类别:科幻参考:BUGTRAQ: 20030108小鬼2。x SQL注入漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104204786206563&w=2参考:DEBIAN: dsa - 229参考:网址:http://www.debian.org/security/2003/dsa - 229参考:SUSE: SuSE-SA: 2003:0008多个SQL注入漏洞IMP 2.2.8早些时候,允许远程攻击者执行未经授权的数据库活动和可能获得特权通过某些数据库函数如check_prefs (db)。使用mailbox.php3 pgsql,作为证明。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0025 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0031网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0031最终决定:阶段性裁决:修改:建议:20030317分配:20030112类别:科幻参考:BUGTRAQ: 20030103多个libmcrypt漏洞参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104162752401212&w=2参考:BUGTRAQ: 20030105 GLSA: libmcrypt参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104188513728573&w=2参考:DEBIAN: dsa - 228参考:网址:http://www.debian.org/security/2003/dsa - 228参考:CONECTIVA: CLA-2003:567参考:网址:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000567参考:SUSE: SuSE-SA: 2003:0010多个缓冲区溢出在libmcrypt 2.5.5允许攻击者造成拒绝服务(崩溃)。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0031 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0034网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0034最终决定:阶段性裁决:修改:建议:20030317分配:20030121类别:科幻参考:MISC:http://www.idefense.com/advisory/01.21.03.txt参考:VULNWATCH: 20030121 iDEFENSE安全顾问01.21.03:缓冲区溢出在Mandrake Linux打印机驱动程序包中引用:网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html参考:曼德拉草:MDKSA-2003:010参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:010缓冲区溢出的mtink状态监控,包括在Mandrake Linux的打印机驱动程序包,允许本地用户执行任意代码通过一个长期的家庭环境变量。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0034 3供应商确认:未知的内容决定:SF-EXEC, SF-CODEBASE抽象:虽然mtink和escputil遭受溢出在同一版本的打印机驱动程序包,iDEFENSE咨询清楚地表明这些实用程序有单独的维护者。因此它们是不同的代码库,并根据CD溢出是分裂:SF-CODEBASE。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0035网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0035最终决定:阶段性裁决:修改:建议:20030317分配:20030121类别:科幻参考:MISC:http://www.idefense.com/advisory/01.21.03.txt参考:VULNWATCH: 20030121 iDEFENSE安全顾问01.21.03:缓冲区溢出在Mandrake Linux打印机驱动程序包中引用:网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html参考:曼德拉草:MDKSA-2003:010参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:010在escputil缓冲区溢出,打印机驱动程序包中包含在Mandrake Linux,允许本地用户执行任意代码通过一个长打印机名命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0035 3供应商确认:未知的内容决定:SF-EXEC, SF-CODEBASE抽象:虽然mtink和escputil遭受溢出在同一版本的打印机驱动程序包,iDEFENSE咨询清楚地表明这些实用程序有单独的维护者。因此它们是不同的代码库,并根据CD溢出是分裂:SF-CODEBASE。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0036网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0036最终决定:阶段性裁决:修改:建议:20030317分配:20030121类别:科幻参考:MISC:http://www.idefense.com/advisory/01.21.03.txt参考:VULNWATCH: 20030121 iDEFENSE安全顾问01.21.03:缓冲区溢出在Mandrake Linux打印机驱动程序包中引用:网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html参考:曼德拉草:MDKSA-2003:010参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:010ml85p,包括在Mandrake Linux的打印机驱动程序包,允许本地用户覆盖任意文件通过一个符号链接攻击临时文件与表单的可预测的文件名“mlg85p % d”。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0036 3供应商确认:未知的内容决定:抽象抽象:这应该并入cve - 2001 - 1177吗?投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0037网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0037最终决定:阶段性裁决:修改:建议:20030317分配:20030123类别:科幻参考:DEBIAN: dsa - 244参考:网址:http://www.debian.org/security/2003/dsa - 244缓冲区溢出noffle新闻服务器1.0.1早些时候,允万博下载包许远程攻击者造成拒绝服务(段错误)和可能执行任意代码。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0037 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0041网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0041最终决定:阶段性裁决:修改:建议:20030317分配:20030127类别:科幻参考:VULNWATCH: 20030128 MIT Kerberos FTP客户端远程shell命令执行参考:网址:http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0047.html参考:REDHAT: RHSA-2003:020参考:网址:http://www.redhat.com/support/errata/rhsa - 2003 - 020. - html参考:曼德拉草:MDKSA-2003:021参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:021Kerberos FTP客户端允许远程FTP站点执行任意代码通过一个管道(|)字符的文件名由客户机检索。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0041 3供应商确认:对咨询内容的决定:SF-CODEBASE抽象:这非常类似于cve - 1999 - 0097,尽管不同的代码库的影响。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0056网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0056最终决定:阶段性裁决:修改:建议:20030317分配:20030129类别:科幻参考:BUGTRAQ: 20030124 (USG - SA - 2003.001)和美国安全顾问(slocate)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104342864418213&w=2参考:BUGTRAQ: 20030125 Re: [USG - SA - 2003.001]美国安全顾问(slocate)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104348607205691&w=2参考:MISC:http://www.usg.org.uk/advisories/2003.001.txt参考:曼德拉草:MDKSA-2003:015参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:015参考:DEBIAN: dsa - 252参考:网址:http://www.debian.org/security/2003/dsa - 252参考:BUGTRAQ: 20030202 GLSA: slocate参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104428624705363&w=2缓冲区溢出在安全定位(slocate)之前2.7允许本地用户执行任意代码通过一个长(1)- c或(2)- r命令行参数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0056 3供应商确认:是的后续内容决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0098网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0098最终决定:阶段性裁决:修改:建议:20030317分配:20030221类别:科幻参考:MISC:http://hsj.shadowpenguin.org/misc/apcupsd_exp.txt参考:曼德拉草:MDKSA-2003:018参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:018参考:MISC:http://securitytracker.com/alerts/2003/Feb/1006108.html参考:确认:http://sourceforge.net/project/shownotes.php?release_id=137900参考:确认:http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/apcupsd/apcupsd/src/apcnisd.c.diff?r1=1.5&r2=1.6参考:XF: apcupsd-logevent-format-string(11334)参考:网址:http://www.iss.net/security_center/static/11334.php未知的漏洞在apcupsd 3.8.6, 3.10。x 3.10.5之前,允许远程攻击者获得根权限,可能通过在请求从服务器格式化字符串。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0098 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0099网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0099最终决定:阶段性裁决:修改:建议:20030317分配:20030221类别:科幻参考:曼德拉草:MDKSA-2003:018参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:018参考:确认:http://sourceforge.net/project/shownotes.php?release_id=137900参考:XF: apcupsd-vsprintf-multiple-bo(11491)参考:网址:http://www.iss.net/security_center/static/11491.php多个缓冲区溢出在apcupsd 3.10.5允许攻击者可能导致拒绝服务或执行任意代码,使用相关函数的函数。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0099 3供应商确认:对咨询内容的决定:SF-LOC投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =候选人:- 2003 - 0101网址:http://cve.mitre.org/cgi - bin/cvename.cgi?name=can - 2003 - 0101最终决定:阶段性裁决:修改:建议:20030317分配:20030224类别:科幻参考:BUGTRAQ: 20030224 (SNS咨询No.62) Webmin / Usermin会话ID欺骗漏洞“集2”参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104610300325629&w=2参考:BUGTRAQ: 20030224 GLSA: usermin(200302 - 14)参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104610336226274&w=2参考:BUGTRAQ: 20030224 Webmin 1.050 - 1.060远程利用参考:网址:http://marc.theaimsgroup.com/?l=bugtraq&m=104610245624895&w=2参考:确认:http://marc.theaimsgroup.com/?l=webmin-announce&m=104587858408101&w=2参考:曼德拉草:MDKSA-2003:025参考:网址:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:025参考:XF: webmin-usermin-root-access(11390)参考:网址:http://www.iss.net/security_center/static/11390.phpminiserv。pl在(1)Webmin 1.070和1.000(2)之前Usermin不妥善处理元字符如换行、回车(CRLF)在base - 64编码的字符串在基本身份验证,它允许远程攻击者欺骗一个会话ID和获得根权限。分析- - - - - - - - - - - - - - - - - ED_PRI - 2003 - 0101 3供应商确认:对咨询内容的决定:SF-EXEC确认:开发人员确认通过电子邮件2月24日,2003年,SNS咨询(学分“圭山崎”)中描述的相同的问题是Webmin咨询(学分而m . Imanishi”)。投票部分- - - - - - - - - - - - - - - -可能的选票:接受/修改/等待/审查/重塑/拒绝如果接受或修改,包括接受的理由:VERIFIED-BY-MY-ORG ACKNOWLEDGED-BY-VENDOR, VERIFIED-BY-SOMEONE-I-TRUST HAS-INDEPENDENT-CONFIRMATION或提供其他原因。投票:ACCEPT_REASON:评论:

页面最后更新或审查:2007年5月22日,