[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

INTERIM DECISION: ACCEPT 50 various candidates (Final 9/28)



I have made an Interim Decision to ACCEPT the following 50 candidates.
These candidates did not have sufficient votes a week ago, so the
Board's response on their tailored ballots allowed these candidates to
be ACCEPTed.

I will make a Final Decision on Tuesday, September 28, which will
bring the total number of candidates to around 320.

- Steve


=================================
Candidate: CAN-1999-0009
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.05.bind_problems
Reference: SGI:19980603-01-PX
Reference: HP:HPSBUX9808-083
Reference: XF:bind-bo
Reference: SUN:00180

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.

VOTES:
   ACCEPT(6) Frech, Northcutt, Blake, Prosser, Balinsky, Levy


=================================
Candidate: CAN-1999-0010
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.05.bind_problems
Reference: SGI:19980603-01-PX
Reference: HP:HPSBUX9808-083
Reference: XF:bind-dos

Denial of Service vulnerability in BIND 8 Releases via maliciously
formatted DNS messages.

VOTES:
   ACCEPT(4) Frech, Blake, Northcutt, Prosser


=================================
Candidate: CAN-1999-0011
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.05.bind_problems
Reference: SGI:19980603-01-PX
Reference: HP:HPSBUX9808-083
Reference: SUN:00180
Reference: XF:bind-axfr-dos

Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases
via CNAME record and zone transfer.

Modifications:
  CHANGEREF XF:bind-dos XF:bind-axfr-dos

VOTES:
   ACCEPT(2) Blake, Northcutt
   MODIFY(1) Frech

COMMENTS:
 Frech> Change XF reference to:
 Frech> XF:bind-axfr-dos


=================================
Candidate: CAN-1999-0016
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-02
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.28.Teardrop_Land
Reference: FreeBSD:FreeBSD-SA-98:01
Reference: HP:HPSBUX9801-076
Reference: CISCO:http://www.cisco.com/warp/public/770/land-pub.shtml
Reference: XF:cisco-land
Reference: XF:land
Reference: XF:95-verv-tcp
Reference: XF:land-patch
Reference: XF:ver-tcpip-sys

Land IP denial of service

Modifications:
  ADDREF HP:HPSBUX9801-076
  ADDREF XF:ver-tcpip-sys
  DELREF XF:land-exploit

VOTES:
   ACCEPT(4) Northcutt, Blake, Balinsky, Ozancin
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:ver-tcpip-sys (applies to a check, not a vulnerability, and is thus not
 Frech> listed on website)
 Frech> XF:land-exploit (obsolete, replaced by land)


=================================
Candidate: CAN-1999-0025
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.21.sgi_buffer_overflow
Reference: AUSCERT:AA-97.19.IRIX.df.buffer.overflow.vul
Reference: XF:df-bo

root privileges via buffer overflow in df command on SGI IRIX
systems.

VOTES:
   ACCEPT(2) Frech, Ozancin


=================================
Candidate: CAN-1999-0026
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.21.sgi_buffer_overflow
Reference: AUSCERT:AA-97.20.IRIX.pset.buffer.overflow.vul
Reference: XF:pset-bo

root privileges via buffer overflow in pset command on SGI IRIX
systems.

VOTES:
   ACCEPT(3) Frech, Prosser, Ozancin


=================================
Candidate: CAN-1999-0027
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.21.sgi_buffer_overflow
Reference: AUSCERT:AA-97.21.IRIX.eject.buffer.overflow.vul
Reference: XF:eject-bo

root privileges via buffer overflow in eject command on SGI IRIX
systems.

VOTES:
   ACCEPT(2) Frech, Ozancin


=================================
Candidate: CAN-1999-0028
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.21.sgi_buffer_overflow
Reference: AUSCERT:AA-97.22.IRIX.login.scheme.buffer.overflow.vul
Reference: XF:sgi-schemebo

root privileges via buffer overflow in login/scheme command on SGI
IRIX systems.

Modifications:
  ADDREF XF:sgi-schemebo

VOTES:
   ACCEPT(1) Prosser
   MODIFY(2) Frech, Ozancin

COMMENTS:
 Frech> XF:sgi-schemebo
 Ozancin> => login/scheme


=================================
Candidate: CAN-1999-0029
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.21.sgi_buffer_overflow
Reference: AUSCERT:AA-97.23-IRIX.ordist.buffer.overflow.vul
Reference: XF:ordist-bo

root privileges via buffer overflow in ordist command on SGI IRIX
systems.

VOTES:
   ACCEPT(2) Frech, Ozancin


=================================
Candidate: CAN-1999-0037
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.14.metamail
Reference: XF:metamail-header-commands

Arbitrary command execution via metamail package using message
headers, when user processes attacker's message using metamail.

Modifications:
  ADDREF XF:metamail-header-commands

VOTES:
   ACCEPT(4) Hill, Prosser, Landfield, Northcutt
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:metamail-header-commands


=================================
Candidate: CAN-1999-0059
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: NAI:NAI-16
Reference: XF:irix-fam

IRIX fam service allows an attacker to obtain a list of all files
on the server.

VOTES:
   ACCEPT(3) Hill, Northcutt, Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:irix-fam


=================================
Candidate: CAN-1999-0068
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: XF:http-cgi-php-mylog
Reference: BUGTRAQ:19971019 Vulnerability in PHP Example Logging Scripts

CGI PHP mylog script allows an attacker to read any file on the
target server.

Modifications:
  ADDREF BUGTRAQ:19971019 Vulnerability in PHP Example Logging Scripts

VOTES:
   ACCEPT(2) Frech, Northcutt
   MODIFY(1) Prosser

COMMENTS:
 Prosser> add source
 Prosser> Bugtraq
 Prosser> "Vulnerability in PHP Example Logging Scripts"
 Prosser> http://www.securityfocus.com/bugtraq/1997_3/0560.html


=================================
Candidate: CAN-1999-0075
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:19961016 Re: ftpd bug? Was: bin/1805: Bug in ftpd
Reference: XF:pasvcore

PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV
command after specifying a username and password.

Modifications:
  ADDREF BUGTRAQ:19961016 Re: ftpd bug? Was: bin/1805: Bug in ftpd
  DESC make more explicit to distinguish from CAN-1999-0076

VOTES:
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> There is no pasvcore record; delete and add
 Frech> XF:ftp-pasvcore
 Prosser> additional sources
 Prosser> Various BUGTRAQ messages
 Prosser> http://www.securityfocus.com/
 Prosser> http://oliver.efri.hr/~crv/security/bugs/SunOS/wuftpd7.html
 Prosser> http://www.insecure.org/sploits


=================================
Candidate: CAN-1999-0084
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:nfs-mknod

NFS mknod bug

VOTES:
   ACCEPT(5) Hill, Frech, Northcutt, Proctor, Balinsky


=================================
Candidate: CAN-1999-0087
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:ibm-telnetdos
Reference: ERS:ERS-SVA-E01-1998:003.1

Denial of service in AIX telnet can freeze a system and prevent
users from accessing the server.

Modifications:
  ADDREF XF:ibm-telnetdos

VOTES:
   ACCEPT(1) Hill
   MODIFY(3) Meunier, Frech, Landfield
   NOOP(2) Northcutt, Christey

COMMENTS:
 Meunier> Add "STD0011:  Incorrect or incomplete address field found and ignored" to
 Meunier> distinguish from other vulnerabilities resulting in DOS on AIX telnet that
 Meunier> might be discovered in the future.
 Frech> XF:ibm-telnetdos
 Christey> To keep the description as short and simple as possible, we
 Christey> should avoid this specific detail until there is a second AIX
 Christey> telnet DoS


=================================
Candidate: CAN-1999-0095
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: CF
Reference: CERT:CA-88.01
Reference: CERT:CA-93.14
Reference: XF:smtp-debug

The debug command in Sendmail is enabled, allowing attackers to
execute commands as root.

Modifications:
  ADDREF CERT:CA-88.01
  ADDREF CERT:CA-93.14
  DESC change to reflect that it's a config problem

VOTES:
   ACCEPT(7) Hill, Frech, Blake, Northcutt, Proctor, Balinsky, Ozancin
   NOOP(1) Christey
   RECAST(1) Prosser

COMMENTS:
 Northcutt> (I swear I have voted for this before, this is how I got into
 Northcutt> computer security, someone broke into my SUN WS doing this)
 Prosser> There is an sendmail 8.6.7 debug vulnerability :source
 Prosser> CERT Advisory CA-94.12
 Prosser> http://www.cert.org
 Prosser> as well as an older BSD sendmail 5.59 debug vulnerability
 Prosser> CERT Advisory CA-88.01,96.20, 24 and 25
 Prosser> which one are we talking about here
 Christey> Some of Steve's votes got lost somehow.  I found them and
 Christey> re-entered them, using his latest votes where conflicts
 Christey> occurred.
 Christey>
 Christey> With respect to CERT advisories, some of the advisories
 Christey> mentioned by Mike are superseded by others, and not available
 Christey> on the CERT web site.  However, this entry is referencing
 Christey> when Sendmail is configured with the Debug option enabled,
 Christey> as referred to in CA-88.01 and CA-93.14.


=================================
Candidate: CAN-1999-0096
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: CF
Reference: CERT:CA-93.16
Reference: CERT:CA-95.05
Reference: CIAC:A-13
Reference: CIAC:A-14
Reference: SUN:00122
Reference: XF:smtp-dcod

Sendmail decode alias can be used to overwrite sensitive files

Modifications:
  ADDREF CERT:CA-93.16
  ADDREF CERT:CA-95.05
  ADDREF CIAC:A-13
  ADDREF CIAC:A-14
  ADDREF SUN:00122

VOTES:
   ACCEPT(7) Hill, Frech, Blake, Northcutt, Proctor, Balinsky, Ozancin
   MODIFY(1) Prosser

COMMENTS:
 Prosser> additional sources
 Prosser> CERT Advisory CA-93:16, CA-95.05
 Prosser> http://www.cert.org
 Prosser> Sun Security Bulletin 00122
 Prosser> http://www.sunsolve.sun.com


=================================
Candidate: CAN-1999-0126
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:VB-98.04.xterm.Xaw
Reference: CIAC:J-010
Reference: XF:xfree86-xterm-xaw
Reference: XF:xfree86-xaw

SGI IRIX buffer overflow in xterm and Xaw allows root access.

Modifications:
  ADDREF XF:xfree86-xterm-xaw
  ADDREF XF:xfree86-xaw

VOTES:
   ACCEPT(3) Northcutt, Prosser, Ozancin
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:xfree86-xterm-xaw
 Frech> XF:xfree86-xaw


=================================
Candidate: CAN-1999-0138
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.12.suidperl_vul
Reference: XF:sperl-suid

The suidperl and sperl program do not give up root privileges when
changing UIDs back to the original users, allowing root access.

Modifications:
  ADDREF XF:sperl-suid

VOTES:
   ACCEPT(1) Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:sperl-suid


=================================
Candidate: CAN-1999-0150
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:perl-fingerd

The Perl fingerd program allows arbitrary command execution from
remote users.

Modifications:
  ADDREF XF:perl-fingerd

VOTES:
   ACCEPT(3) Hill, Northcutt, Proctor
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:perl-fingerd


=================================
Candidate: CAN-1999-0152
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:19970811 dgux in.fingerd vulnerability
Reference: XF:dgux-fingerd

The DG/UX finger daemon allows remote command execution through shell
metacharacters.

Modifications:
  ADDREF BUGTRAQ:19970811 dgux in.fingerd vulnerability

VOTES:
   ACCEPT(5) Hill, Frech, Northcutt, Proctor, Balinsky
   MODIFY(1) Prosser

COMMENTS:
 Prosser> additional resource
 Prosser> Bugtraq
 Prosser> "dgux in.fingerd vulnerability"
 Prosser> http://www.securityfocus.com/


=================================
Candidate: CAN-1999-0167
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:nfs-guess
Reference: CERT:CA-91.21.SunOS.NFS.Jumbo.and.fsirand

In SunOS, NFS file handles could be guessed, giving unauthorized
access to the exported file system.

Modifications:
  ADDREF CERT:CA-91.21.SunOS.NFS.Jumbo.and.fsirand

VOTES:
   ACCEPT(6) Hill, Frech, Blake, Northcutt, Proctor, Balinsky
   MODIFY(1) Prosser

COMMENTS:
 Prosser> sort of an oldie source
 Prosser> CERT Security Alert CA-91:21
 Prosser> http://www.cert.org


=================================
Candidate: CAN-1999-0175
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:http-nov-convert

The convert.bas program in the Novell web server allows a remote
attackers to read any file on the system that is internally accessible
by the web server.

VOTES:
   ACCEPT(4) Hill, Frech, Blake, Northcutt


=================================
Candidate: CAN-1999-0183
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:linux-tftp

Linux implementations of TFTP would allow access to files outside the
restricted directory.

VOTES:
   ACCEPT(3) Hill, Frech, Landfield
   NOOP(1) Northcutt


=================================
Candidate: CAN-1999-0202
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:ftp-exectar

The GNU tar command, when used in FTP sessions, may allow an attacker
to execute arbitrary commands.

VOTES:
   ACCEPT(4) Hill, Frech, Northcutt, Proctor


=================================
Candidate: CAN-1999-0204
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:ident-bo

Sendmail 8.6.9 allows remote attackers to execute root commands, using
ident.

Modifications:
  ADDREF XF:ident-bo

VOTES:
   ACCEPT(3) Hill, Balinsky, Landfield
   NOOP(1) Northcutt
   REVIEWING(1) Frech

COMMENTS:
 Frech> probably XF:ident-bo


=================================
Candidate: CAN-1999-0245
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:19950907 Linux NIS security problem hole and fix
Reference: XF:linux-plus

Some configurations of NIS+ in Linux allowed attackers
to log in as the user "+"

Modifications:
  REFERENCE
  ADDREF BUGTRAQ:19950907 Linux NIS security problem hole and fix

VOTES:
   ACCEPT(3) Hill, Frech, Northcutt
   MODIFY(1) Prosser

COMMENTS:
 Prosser> source
 Prosser> BUGTRAQ
 Prosser> "Linux NIS security problem hole and fix"
 Prosser> http://www.securityfocus.com/


=================================
Candidate: CAN-1999-0260
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:19961224 jj cgi
Reference: XF:http-cgi-jj

The jj CGI program allows command execution via shell metacharacters.

Modifications:
  ADDREF XF:http-cgi-jj
  ADDREF BUGTRAQ:19961224 jj cgi

VOTES:
   ACCEPT(2) Hill, Ozancin
   MODIFY(1) Frech
   NOOP(2) Northcutt, Landfield

COMMENTS:
 Frech> XF:http-cgi-jj


=================================
Candidate: CAN-1999-0273
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:sun-telnet-kill

Denial of service through Solaris 2.5.1 telnet by sending ^D characters.

Modifications:
  ADDREF XF:sun-telnet-kill

VOTES:
   ACCEPT(3) Hill, Blake, Northcutt
   MODIFY(1) Frech
   NOOP(1) Meunier

COMMENTS:
 Frech> XF:sun-telnet-kill


=================================
Candidate: CAN-1999-0281
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:http-iis-longurl

Denial of service in IIS using long URLs.

Modifications:
  ADDREF XF:http-iis-longurl

VOTES:
   ACCEPT(6) Hill, Blake, Wall, Balinsky, Ozancin, Northcutt
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:http-iis-longurl


=================================
Candidate: CAN-1999-0289
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF

The Apache web server for Win32 may provide access to restricted
files when a . (dot) is appended to a requested URL.

VOTES:
   ACCEPT(4) Hill, Blake, Landfield, Ozancin
   NOOP(1) Northcutt
   REVIEWING(1) Frech


=================================
Candidate: CAN-1999-0346
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: XF:http-cgi-php-mlog

CGI PHP mlog script allows an attacker to read any file on the target
server.

Modifications:
  ADDREF XF:http-cgi-php-mlog

VOTES:
   ACCEPT(2) Northcutt, Proctor
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:http-cgi-php-mlog


=================================
Candidate: CAN-1999-0348
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: NTBUGTRAQ:Jan27,1999
Reference: MSKB:Q197003

IIS ASP caching problem releases sensitive information when two
virtual servers share the same physical directory.

Modifications:
  ADDREF MSKB:Q197003

VOTES:
   ACCEPT(4) Northcutt, Prosser, Wall, Levy
   REVIEWING(1) Frech

COMMENTS:
 Prosser> additional source
 Prosser> MS KnowledgeBase Article Q197003
 Prosser> http://support.microsoft.com/support/kb/articles/q197/0/03.asp


=================================
Candidate: CAN-1999-0350
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: L0PHT:Feb8,1999
Reference: XF:clearcase-temp-race

Race condition in the db_loader program in ClearCase gives local
users root access by setting SUID bits.

Modifications:
  ADDREF XF:clearcase-temp-race

VOTES:
   ACCEPT(3) Hill, Prosser, Northcutt
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:clearcase-temp-race


=================================
Candidate: CAN-1999-0362
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: EEYE:AD02021999
Reference: XF:wsftp-remote-dos
Reference: SF:217

WS_FTP server remote denial of service through cwd command.

VOTES:
   ACCEPT(4) Ozancin, Frech, Northcutt, Levy
   NOOP(1) Wall


=================================
Candidate: CAN-1999-0368
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990623
Assigned: 19990607
Category: SF
Reference: NETECT:palmetto.ftpd
Reference: CERT:CA-99.03
Reference: XF:palmetto-ftpd-bo

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to
remote root access, a.k.a. palmetto.

Modifications:
  ADDREF XF:palmetto-ftpd-bo

VOTES:
   ACCEPT(2) Northcutt, Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> XF:palmetto-ftpd-bo


=================================
Candidate: CAN-1999-0383
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Feb02,1999
Reference: XF:acc-tigris-login

ACC Tigris allows public access without a login.

Modifications:
  DESC change allowed to allows for consistency

VOTES:
   ACCEPT(1) Ozancin
   MODIFY(1) Frech
   NOOP(3) Wall, Northcutt, Landfield

COMMENTS:
 Frech> Change allowed to allows.


=================================
Candidate: CAN-1999-0388
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:datalynx-suguard-relative-paths
Reference: L0PHT:Jan3,1999

DataLynx suGuard trusts the PATH environment variable to execute the
ps command, allowing local users to execute commands as root.

VOTES:
   ACCEPT(4) Hill, Frech, Prosser, Northcutt


=================================
Candidate: CAN-1999-0391
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: L0PHT:Jan. 5, 1999

The cryptographic challenge of SMB authentication in Windows 95 and
Windows 98 is reused, allowing an attacker to replay the response and
inpersonate a user.

VOTES:
   ACCEPT(4) Hill, Northcutt, Landfield, Levy
   REVIEWING(1) Frech


=================================
Candidate: CAN-1999-0412
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Feb19,1999
Reference: XF:iis-isapi-execute
Reference: SF:501

In IIS and other web servers, an attacker can attack commands as
SYSTEM if the server is running as SYSTEM and loading an ISAPI
extension.

VOTES:
   ACCEPT(2) Frech, Wall
   NOOP(1) Ozancin


=================================
Candidate: CAN-1999-0424
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: SUSE:Mar18,1999
Reference: XF:netscape-talkback-overwrite

talkback in Netscape 4.5 allows a local user to overwrite
arbitrary files of another user whose Netscape crashes.

VOTES:
   ACCEPT(3) Ozancin, Frech, Prosser
   REVIEWING(1) Wall

COMMENTS:
 Prosser> source should be
 Prosser> SuSE Security Announcements
 Prosser> "Security hole in Netscape Communicator's 4.5 'talkback' function"
 Prosser> http://www.suse.de/security


=================================
Candidate: CAN-1999-0425
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: SUSE:Mar18,1999
Reference: XF:netscape-talkback-kill

talkback in Netscape 4.5 allows a local user to kill an arbitrary
process of another user whose Netscape crashes.

VOTES:
   ACCEPT(3) Ozancin, Frech, Prosser
   REVIEWING(1) Wall

COMMENTS:
 Prosser> again source should be
 Prosser> SuSE Security Announcements
 Prosser> "Security hole in Netscape Communicator's 4.5 'talkback' function"
 Prosser> http://www.suse.de/security


=================================
Candidate: CAN-1999-0437
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: ISS:WebRamp Denial of Service Attacks
Reference: XF:webramp-device-crash

Remote attackers can perform a denial of service in WebRamp systems by
sending a malicious string to the HTTP port.

Modifications:
  ADDREF XF:webramp-device-crash

VOTES:
   ACCEPT(2) Hill, Meunier
   MODIFY(1) Frech
   NOOP(2) Northcutt, Landfield

COMMENTS:
 Frech> XF:webramp-device-crash
 Landfield> - really should specify versions


=================================
Candidate: CAN-1999-0438
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: ISS:WebRamp Denial of Service Attacks
Reference: XF:webramp-ipchange

Remote attackers can perform a denial of service in WebRamp systems by
sending a malicious UDP packet to port 5353, changing its IP address.

Modifications:
  ADDREF XF:webramp-ipchange

VOTES:
   ACCEPT(2) Hill, Meunier
   MODIFY(1) Frech
   NOOP(2) Northcutt, Landfield

COMMENTS:
 Frech> XF:webramp-ipchange
 Landfield> - really should specify versions


=================================
Candidate: CAN-1999-0448
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: XF:iis-http-request-logging

IIS 4.0 and Apache log HTTP request methods, regardless of how long
they are, allowing a remote attacker to hide the URL they really
request.

VOTES:
   ACCEPT(3) Frech, Wall, Levy
   NOOP(2) Ozancin, Landfield


=================================
Candidate: CAN-1999-0449
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990726
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Jan26,1999
Reference: XF:iis-exair-dos
Reference: SF:193

Denial of service in IIS 4 with scripts from the ExAir sample site.

VOTES:
   ACCEPT(4) Wall, Frech, Northcutt, Levy


=================================
Candidate: CAN-1999-0458
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Jan6,1999
Reference: XF:l0phtcrack-temp-files

L0phtcrack 2.5 used temporary files in the system TEMP directory which
could contain password information.

Modifications:
  ADDREF XF:l0phtcrack-temp-files

VOTES:
   ACCEPT(3) Hill, Prosser, Northcutt
   MODIFY(1) Frech
   NOOP(2) Landfield, Levy

COMMENTS:
 Frech> XF:l0phtcrack-temp-files


=================================
Candidate: CAN-1999-0494
Published:
Final-Decision:
Interim-Decision: 19990925
Modified:
Proposed: 19990630
Assigned: 19990607
Category: SF
Reference: XF:wingate-pop3-user-bo

Denial of service in WinGate proxy through a buffer overflow in
POP3.

VOTES:
   ACCEPT(5) Hill, Frech, Northcutt, Landfield, Ozancin


=================================
Candidate: CAN-1999-0514
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: CF
Reference: XF:fraggle

UDP messages to broadcast addresses are allowed, allowing for a
Fraggle attack that can cause a denial of service by flooding the
target.

Modifications:
  ADDREF XF:fraggle
  DESC clarified at Landfield's prompting

VOTES:
   ACCEPT(2) Hill, Northcutt
   MODIFY(1) Frech
   REVIEWING(1) Landfield

COMMENTS:
 Frech> XF:fraggle
 Landfield> System ? General Stack issue ?  This is not clear.


=================================
Candidate: CAN-1999-0526
Published:
Final-Decision:
Interim-Decision: 19990925
Modified: 19990925-01
Proposed: 19990630
Assigned: 19990607
Category: CF
Reference: XF:xcheck-keystroke

An X server's access control is disabled (e.g. through an "xhost +"
command) and allows anyone to connect to the server.

Modifications:
  ADDREF XF:xcheck-keystroke
  DESC Rephrase per Northcutt's suggestion

VOTES:
   ACCEPT(4) Hill, Blake, Proctor, Balinsky
   MODIFY(2) Frech, Northcutt

COMMENTS:
 Frech> XF:xcheck-keystroke
 Northcutt> X does have some access control as long as a user (insider) doesn't type
 Northcutt> "xhost +". I don't think an outsider can disable the access.
 Northcutt> Suggested phrasing "An X server's access control can be disabled e.g.
 Northcutt> through an "xhost +" command and allows anyone to connect to the server."

 
Page Last Updated: May 22, 2007