[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[INTERIM] ACCEPT 34 recent candidates (Final 6/1)



I have made an Interim Decision to ACCEPT the following 34 candidates
from various RECENT-XX clusters, most of which were originally
proposed sometime in 1999.  I will make a Final Decision on the
evening of June 1, 2000.

The candidates come from the following clusters:

  11 RECENT-01
   1 RECENT-02
   1 RECENT-04
   1 RECENT-07
   2 RECENT-13
  11 RECENT-14
   4 RECENT-15
   3 RECENT-16

Voters:
  Wall ACCEPT(3) NOOP(9)
  Levy ACCEPT(3)
  LeBlanc NOOP(9)
  Ozancin ACCEPT(2)
  Cole ACCEPT(24) MODIFY(4) NOOP(5)
  Stracener ACCEPT(17) MODIFY(2) NOOP(1)
  Dik MODIFY(1)
  Frech ACCEPT(3) MODIFY(27)
  Northcutt ACCEPT(7)
  Christey NOOP(10)
  Armstrong ACCEPT(13) NOOP(6)
  Prosser ACCEPT(9) NOOP(1) REVIEWING(1)
  Blake NOOP(2) RECAST(1)


=================================
Candidate: CAN-1999-0819
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: NTBUGTRAQ:19991130 NTmail and VRFY
Reference: BUGTRAQ:19991130 NTmail and VRFY
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94398141118586&w=2
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94407764018739&w=2
Reference: XF:nt-mail-vrfy

NTMail does not disable the VRFY command, even if the administrator
has explicitly disabled it.

Modifications:
  ADDREF XF:nt-mail-vrfy

INFERRED ACTION: CAN-1999-0819 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Stracener, Prosser
   MODIFY(2) Cole, Frech
   NOOP(2) Armstrong, Christey

Comments:
 Cole> The references are wrong.  The BID is 856 and the full ID is
 Cole> 19991129 not 30.
 Cole> I would add that NTMail does not disable the VRFY command on ESMTP
 Cole> servers, even ...  This can be used to gather information about users email
 Cole> addresses.
 Frech> XF:nt-mail-vrfy
 Christey> Mike Prosser's REVIEWING vote expires on May 8, 2000


=================================
Candidate: CAN-1999-0832
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-02
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991109 undocumented bugs - nfsd
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.20.9911091058140.12964-100000@mail.zigzag.pl
Reference: DEBIAN:19991111 buffer overflow in nfs server
Reference: URL:http://www.debian.org/security/1999/19991111
Reference: SUSE:19991110 Security hole in nfs-server < 2.2beta47 within nkita
Reference: URL:http://www.suse.de/de/support/security/suse_security_announce_29.txt
Reference: CALDERA:CSSA-1999-033.0
Reference: URL:ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-033.0.txt
Reference: REDHAT:RHSA-1999:053-01
Reference: URL:http://www.redhat.com/support/errata/rh42-errata-general.html#NFS
Reference: BUGTRAQ:19991130 [david@slackware.com: New Patches for Slackware 4.0 Available]
Reference: XF:linux-nfs-maxpath-bo
Reference: BID:782
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=782

Buffer overflow in NFS server on Linux allows attackers to execute
commands via a long pathname.

Modifications:
  ADDREF BUGTRAQ:19991109 undocumented bugs - nfsd
  ADDREF DEBIAN:19991111 buffer overflow in nfs server
  ADDREF SUSE:19991110 Security hole in nfs-server < 2.2beta47 within nkita
  ADDREF CALDERA:CSSA-1999-033.0
  ADDREF REDHAT:RHSA-1999:053-01
  ADDREF BID:782
  ADDREF XF:linux-nfs-maxpath-bo
  DESC Remove Slackware, say it's on Linux systems.

INFERRED ACTION: CAN-1999-0832 ACCEPT (5 accept, 4 ack, 0 review)

Current Votes:
   ACCEPT(3) Armstrong, Cole, Prosser
   MODIFY(2) Stracener, Frech
   NOOP(1) Christey

Comments:
 Stracener> Suggest removing "Slackware 7.0" from the description
 Stracener> Add Ref: CSSA-1999-033.0
 Stracener> Add Ref: DEBIAN: nfs-server: buffer overflow in nfs server 11/11/99
 Stracener> Add Ref: SuSE Security Announcement "nfs-server < 2.2beta47 within
 Stracener> nkita" 11/12/99
 Frech> XF:linux-nfs-maxpath-bo
 Christey> ADDREF DEBIAN:19991111 buffer overflow in nfs server
 Christey> ADDREF SUSE:19991110 Security hole in nfs-server < 2.2beta47 within nkita
 Christey> ADDREF CALDERA:CSSA-1999-033.0
 Christey> ADDREF RHSA-1999:053-01
 Christey> ADDREF? BID:782
 Christey> ADDREF? BUGTRAQ:19991109 undocumented bugs - nfsd
 Prosser> agree that description should be generic Linux vice Slackware
 Prosser> only since multiple versions affected


=================================
Candidate: CAN-1999-0836
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000501-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991202 UnixWare 7 uidadmin exploit + discussion
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991202160111.20553.qmail@nwcst282.netaddress.usa.net
Reference: SCO:SB-99.22a
Reference: URL:ftp://ftp.sco.com/SSE/security_bulletins/SB-99.22a
Reference: BID:842
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=842
Reference: XF:unixware-uid-admin

UnixWare uidadmin allows local users to modify arbitrary files via
a symlink attack.

Modifications:
  ADDREF BID:842
  ADDREF XF:unixware-uid-admin
  ADDREF SCO:SB-99.22a

INFERRED ACTION: CAN-1999-0836 ACCEPT (5 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Stracener, Armstrong, Prosser
   MODIFY(2) Cole, Frech
   NOOP(1) Christey

Comments:
 Cole> The BID is 842.
 Frech> unixware-uid-admin
 Christey> ADDREF ftp://ftp.sco.com/SSE/security_bulletins/SB-99.22a


=================================
Candidate: CAN-1999-0838
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991202 Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability
Reference: XF:servu-ftp-site-bo

Buffer overflow in Serv-U FTP 2.5 allows remote users to conduct a
denial of service via the SITE command.

Modifications:
  ADDREF XF:servu-ftp-site-bo

INFERRED ACTION: CAN-1999-0838 ACCEPT (5 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(4) Armstrong, Cole, Stracener, Prosser
   MODIFY(1) Frech

Comments:
 Frech> XF:servu-ftp-site-bo


=================================
Candidate: CAN-1999-0842
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: NTBUGTRAQ:19991129 Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability
Reference: BUGTRAQ:19991129 Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEAFCBAA.labs@ussrback.com
Reference: BID:827
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=827
Reference: XF:symantec-mail-dir-traversal

Symantec Mail-Gear 1.0 web interface server allows remote users to
read arbitrary files via a .. (dot dot) attack.

Modifications:
  ADDREF XF:symantec-mail-dir-traversal

INFERRED ACTION: CAN-1999-0842 ACCEPT (5 accept, 0 ack, 0 review)

Current Votes:
   ACCEPT(4) Armstrong, Cole, Stracener, Prosser
   MODIFY(1) Frech

Comments:
 Frech> XF:symantec-mail-dir-traversal


=================================
Candidate: CAN-1999-0854
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: unknown
Reference: BUGTRAQ:19991130 Ultimate Bulletin Board v5.3x? Bug
Reference: BUGTRAQ:20000225 FW: Important UBB News For Licensed Users
Reference: CONFIRM:http://www.ultimatebb.com/home/versions.shtml
Reference: XF:http-ultimate-bbs

Ultimate Bulletin Board stores data files in the cgi-bin directory,
allowing remote attackers to view the data if an error occurs when the
HTTP server attempts to execute the file.

Modifications:
  ADDREF BUGTRAQ:20000225 FW: Important UBB News For Licensed Users
  ADDREF CONFIRM:http://www.ultimatebb.com/home/versions.shtml

INFERRED ACTION: CAN-1999-0854 ACCEPT (3 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Armstrong, Cole
   MODIFY(1) Frech
   NOOP(3) Stracener, Christey, Prosser

Comments:
 Frech> XF:http-ultimate-bbs
 Christey> The following could be a confirmation by UBB:
 Christey> BUGTRAQ:20000225 FW: Important UBB News For Licensed Users
 Christey> Also see the entry for Version 5.44 on February 18, 2000
 Christey> at http://www.ultimatebb.com/home/versions.shtml


=================================
Candidate: CAN-1999-0856
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991202 Slackware 7.0 - login bug
Reference: XF:slackware-remote-login

login in Slackware 7.0 allows remote attackers to identify valid users
on the system by reporting an encryption error when an account is
locked or does not exist.

Modifications:
  ADDREF XF:slackware-remote-login

INFERRED ACTION: CAN-1999-0856 ACCEPT_REV (4 accept, 0 ack, 1 review)

Current Votes:
   ACCEPT(3) Armstrong, Cole, Stracener
   MODIFY(1) Frech
   REVIEWING(1) Prosser

Comments:
 Frech> XF:slackware-remote-login


=================================
Candidate: CAN-1999-0859
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991130 Solaris 2.x chkperm/arp vulnerabilities
Reference: SUNBUG:4296166
Reference: BID:837
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=837
Reference: XF:sol-arp-parse

Solaris arp allows local users to read files via the -f parameter,
which lists lines in the file that do not parse properly.

Modifications:
  ADDREF SUNBUG:4296166
  ADDREF XF:sol-arp-parse

INFERRED ACTION: CAN-1999-0859 ACCEPT (6 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Armstrong, Stracener, Prosser
   MODIFY(3) Cole, Frech, Dik

Comments:
 Cole> This attack makes it possible to read bin and owned files to which
 Cole> read access is not permitted to local users through exploiting subtle
 Cole> vulenrabilties in arp and chkperm.
 Frech> XF:sol-arp-parse
 Dik> include reference to Sun bug 4296166


=================================
Candidate: CAN-1999-0864
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-02
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991202 UnixWare coredumps follow symlinks
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991203020720.13115.qmail@nwcst289.netaddress.usa.net
Reference: BUGTRAQ:19991215 Recent postings about SCO UnixWare 7
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94530783815434&w=2
Reference: BUGTRAQ:19991223 FYI, SCO Security patches available.
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94606167110764&w=2
Reference: BUGTRAQ:19991220 SCO OpenServer Security Status
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94581379905584&w=2
Reference: XF:sco-coredump-symlink
Reference: BID:851
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=851

UnixWare programs that dump core allow a local user to
modify files via a symlink attack on the ./core.pid file.

Modifications:
  ADDREF BUGTRAQ:19991223 FYI, SCO Security patches available.
  ADDREF BUGTRAQ:19991220 SCO OpenServer Security Status
  ADDREF XF:sco-coredump-symlink

INFERRED ACTION: CAN-1999-0864 ACCEPT (5 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(4) Armstrong, Cole, Stracener, Prosser
   MODIFY(1) Frech

Comments:
 Frech> XF:sco-coredump-symlink
 Prosser> FYI, the ptf 7016m that fixes this problem in UnixWare 7.0 is
 Prosser> still available. However, it appears (at least I haven't been able to view
 Prosser> them) 7096n for 7.0.1, 7413j for 7.1.0, and 7626a for 7.1.1 are no longer
 Prosser> available from the SCO Security Site.  Don't know if they are fixing them
 Prosser> since they were pre-release or have included them in other SSEs or upgrades.


=================================
Candidate: CAN-1999-0865
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991203 CommuniGatePro 3.1 for NT DoS
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94426440413027&w=2
Reference: NTBUGTRAQ:19991203 CommuniGatePro 3.1 for NT Buffer Overflow
Reference: URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=94454565726775&w=2
Reference: BID:860
Reference: XF:communigate-pro-bo

Buffer overflow in CommuniGatePro via a long string to the HTTP
configuration port.

Modifications:
  ADDREF BID:860
  ADDREF XF:communigate-pro-bo

INFERRED ACTION: CAN-1999-0865 ACCEPT (5 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(4) Armstrong, Cole, Stracener, Prosser
   MODIFY(1) Frech

Comments:
 Frech> XF:communigate-pro-bo
 Prosser> add BID 860, http://www.securityfocus.com/bid/860


=================================
Candidate: CAN-1999-0866
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000501-02
Proposed: 19991208
Assigned: 19991207
Category: SF
Reference: BUGTRAQ:19991203 UnixWare gain root with non-su/gid binaries
Reference: BUGTRAQ:19991215 Recent postings about SCO UnixWare 7
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94530783815434&w=2
Reference: BUGTRAQ:19991223 FYI, SCO Security patches available.
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94606167110764&w=2
Reference: BUGTRAQ:19991220 SCO OpenServer Security Status
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94581379905584&w=2
Reference: SCO:SB-99.24a
Reference: URL:ftp://ftp.sco.com/SSE/security_bulletins/SB-99.24a
Reference: XF:sco-xauto-bo
Reference: BID:848
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=848

Buffer overflow in UnixWare xauto program allows local users to gain
root privilege.

Modifications:
  ADDREF BUGTRAQ:19991223 FYI, SCO Security patches available.
  ADDREF BUGTRAQ:19991220 SCO OpenServer Security Status
  ADDREF XF:sco-xauto-bo
  ADDREF SCO:SB-99.24a

INFERRED ACTION: CAN-1999-0866 ACCEPT (5 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Armstrong, Stracener, Prosser
   MODIFY(2) Cole, Frech
   NOOP(1) Christey

Comments:
 Cole> I would take out the word local.
 Frech> XF:sco-xauto-bo
 Christey> ADDREF ftp://ftp.sco.com/SSE/security_bulletins/SB-99.24a


=================================
Candidate: CAN-1999-0976
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 19991214
Assigned: 19991214
Category: SF
Reference: OPENBSD:19991204
Reference: BUGTRAQ:19991207 [Debian] New version of sendmail released
Reference: XF:sendmail-bi-alias
Reference: BID:857
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=857

Sendmail allows local users to reinitialize the aliases database via
the newaliases command, then cause a denial of service by interrupting
Sendmail.

Modifications:
  ADDREF OPENBSD:19991204
  ADDREF XF:sendmail-bi-alias

INFERRED ACTION: CAN-1999-0976 RECAST (1 recast, 3 accept, 0 review)

Current Votes:
   ACCEPT(2) Cole, Stracener
   MODIFY(1) Frech
   NOOP(1) Christey
   RECAST(1) Blake

Comments:
 Blake> *This issue is insufficiently defined.  I can't see why it should be
 Blake> restricted to Debian, in fact, I just ran newaliases on FreeBSD-3.2 as a
 Blake> regular user and is ran.  Perhaps the entry can be broadened to include
 Blake> incorrect permissions on the newaliases binary...
 Frech> XF:sendmail-bi-alias
 Christey> ADDREF OPENBSD:19991204
 Christey> http://www.openbsd.org/errata.html#sendmail


=================================
Candidate: CAN-2000-0004
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-02
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: NTBUGTRAQ:19991223 Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT
Reference: BUGTRAQ:19991223 Re: Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94606572912422&w=2
Reference: XF:zbserver-url-dot

ZBServer Pro allows remote attackers to read source code for
executable files by inserting a . (dot) into the URL.

Modifications:
  ADDREF XF:zbserver-url-dot

INFERRED ACTION: CAN-2000-0004 ACCEPT (3 accept, 0 ack, 0 review)

Current Votes:
   ACCEPT(1) Armstrong
   MODIFY(2) Stracener, Frech
   NOOP(1) Christey

Comments:
 Stracener> The references don't discuss the (dot) attack mentioned in the
 Stracener> description. Suggest changing the description or citing the relevant
 Stracener> sources.
 Christey> An email followup mentioned another possible bug.
 Christey> See http://marc.theaimsgroup.com/?l=bugtraq&m=94606572912422&w=2
 Christey>
 Frech> XF:zbserver-url-dot


=================================
Candidate: CAN-2000-0113
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000419-01
Proposed: 20000208
Assigned: 20000208
Category: SF
Reference: BUGTRAQ:20000128 SyGate 3.11 Port 7323 / Remote Admin hole
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94934808714972&w=2
Reference: BUGTRAQ:20000202 SV: SyGate 3.11 Port 7323 / Remote Admin hole
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94952641025328&w=2
Reference: BUGTRAQ:20000203 UPDATE: Sygate 3.11 Port 7323 Telnet Hole
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=94973281714994&w=2
Reference: CONFIRM:http://www.sybergen.com/support/fix.htm
Reference: BID:952
Reference: URL:http://www.securityfocus.com/vdb/bottom.html?vid=952

The SyGate Remote Management program does not properly restrict access
to its administration service, which allows remote attackers to
cause a denial of service, or access network traffic statistics.

INFERRED ACTION: CAN-2000-0113 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Cole, Levy
   NOOP(2) Christey, Wall

Comments:
 Christey> Sygate confirms this in 01/2000 - Build 563 (Beta) with
 Christey> the comment: "fix to block external telnet to port 7323
 Christey> without enhanced security."


=================================
Candidate: CAN-2000-0169
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000322
Assigned: 20000322
Category: SF
Reference: NTBUGTRAQ:20000314 Oracle Web Listener 4.0.x
Reference: URL:http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0211.html
Reference: BID:1053
Reference: URL:http://www.securityfocus.com/bid/1053
Reference: XF:oracle-weblistener-remote-attack

Batch files in the Oracle web listener ows-bin directory allow remote
attackers to execute commands via a malformed URL that includes '?&'.

Modifications:
  ADDREF XF:oracle-weblistener-remote-attack

INFERRED ACTION: CAN-2000-0169 ACCEPT (3 accept, 0 ack, 0 review)

Current Votes:
   ACCEPT(2) Ozancin, Cole
   MODIFY(1) Frech
   NOOP(3) Wall, Blake, LeBlanc

Comments:
 Frech> XF:oracle-weblistener-remote-attack


=================================
Candidate: CAN-2000-0171
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000322
Assigned: 20000322
Category: SF
Reference: BUGTRAQ:20000311 TESO advisory -- atsadc
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-03/0102.html
Reference: XF:atsar-root-access
Reference: BID:1048
Reference: URL:http://www.securityfocus.com/bid/1048

atsadc in the atsar package for Linux does not properly check the
permissions of an output file, which allows local users to gain root
privileges.

Modifications:
  ADDREF XF:atsar-root-access

INFERRED ACTION: CAN-2000-0171 ACCEPT (3 accept, 0 ack, 0 review)

Current Votes:
   ACCEPT(2) Ozancin, Cole
   MODIFY(1) Frech
   NOOP(3) Wall, Blake, LeBlanc

Comments:
 Frech> XF:atsar-root-access


=================================
Candidate: CAN-2000-0226
Published:
Final-Decision:
Interim-Decision: 20000530
Modified:
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: MS:MS00-018
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-018.asp
Reference: BID:1066
Reference: URL:http://www.securityfocus.com/bid/1066
Reference: XF:iis-chunked-encoding-dos

IIS 4.0 allows attackers to cause a denial of service by requesting a
large buffer in a POST or PUT command which consumes memory, aka the
"Chunked Transfer Encoding Buffer Overflow Vulnerability."

INFERRED ACTION: CAN-2000-0226 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Frech, Cole


=================================
Candidate: CAN-2000-0228
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: MS:MS00-016
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-016.asp
Reference: BID:1058
Reference: URL:http://www.securityfocus.com/bid/1058
Reference: XF:mwmt-malformed-media-license

Microsoft Windows Media License Manager allows remote attackers to
cause a denial of service by sending a malformed request that causes
the manager to halt, aka the "Malformed Media License Request"
Vulnerability.

Modifications:
  ADDREF XF:mwmt-malformed-media-license

INFERRED ACTION: CAN-2000-0228 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(1) Cole
   MODIFY(1) Frech

Comments:
 Frech> XF:mwmt-malformed-media-license


=================================
Candidate: CAN-2000-0229
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000424-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: BUGTRAQ:20000322 gpm-root
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000322182143.4498.qmail@securityfocus.com
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html
Reference: SUSE:20000405 Security hole in gpm < 1.18.1
Reference: URL:http://www.suse.de/de/support/security/suse_security_announce_45.txt
Reference: REDHAT:RHSA-2000:009-02
Reference: URL:http://www.redhat.com/support/errata/RHSA-2000009-02.html
Reference: BID:1069
Reference: URL:http://www.securityfocus.com/bid/1069
Reference: XF:linux-gpm-root

gpm-root in the gpm package does not properly drop privileges, which
allows local users to gain privileges by starting a utility from
gpm-root.

Modifications:
  ADDREF SUSE:20000405 Security hole in gpm < 1.18.1
  ADDREF REDHAT:RHSA-2000:009-02

INFERRED ACTION: CAN-2000-0229 ACCEPT_ACK (2 accept, 2 ack, 0 review)

Current Votes:
   ACCEPT(2) Frech, Levy
   NOOP(2) Cole, Wall


=================================
Candidate: CAN-2000-0230
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-02
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: BUGTRAQ:20000316 TESO & C-Skills development advisory -- imwheel
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html
Reference: REDHAT:RHSA-2000:016-02
Reference: URL:http://www.redhat.com/support/errata/RHSA-2000016-02.html
Reference: XF:linux-imwheel-bo
Reference: BID:1060
Reference: URL:http://www.securityfocus.com/bid/1060

Buffer overflow in imwheel allows local users to gain root privileges
via the imwheel-solo script and a long HOME environmental variable.

Modifications:
  ADDREF REDHAT:RHSA-2000:016-02
  ADDREF XF:linux-imwheel-bo

INFERRED ACTION: CAN-2000-0230 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(1) Levy
   MODIFY(1) Frech
   NOOP(2) Cole, Wall

Comments:
 Frech> XF:linux-imwheel-bo


=================================
Candidate: CAN-2000-0231
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000421-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: BUGTRAQ:20000316 "TESO & C-Skills development advisory -- kreatecd" at:
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-03/0162.html
Reference: SUSE:20000405 Security hole in kreatecd < 0.3.8b
Reference: URL:http://www.suse.de/de/support/security/suse_security_announce_46.txt
Reference: XF:linux-kreatecd-path
Reference: BID:1061
Reference: URL:http://www.securityfocus.com/bid/1061

Linux kreatecd trusts a user-supplied path that is used to find the
cdrecord program, allowing local users to gain root privileges.

Modifications:
  ADDREF SUSE:20000405 Security hole in kreatecd < 0.3.8b

INFERRED ACTION: CAN-2000-0231 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Frech, Cole


=================================
Candidate: CAN-2000-0232
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: MS:MS00-021
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-021.asp
Reference: BUGTRAQ:20000330 Remote DoS Attack in Windows 2000/NT 4.0 TCP/IP Print Request Server Vulnerability
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-03/0306.html
Reference: BID:1082
Reference: URL:http://www.securityfocus.com/bid/1082
Reference: XF:win-tcpip-printing-dos

Microsoft TCP/IP Printing Services, aka Print Services for Unix,
allows an attacker to cause a denial of service via a malformed TCP/IP
print request.

Modifications:
  ADDREF XF:win-tcpip-printing-dos

INFERRED ACTION: CAN-2000-0232 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(1) Cole
   MODIFY(1) Frech

Comments:
 Frech> XF:win-tcpip-printing-dos


=================================
Candidate: CAN-2000-0233
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: SUSE:20000327 Security hole in SuSE Linux IMAP Server
Reference: URL:http://archives.neohapsis.com/archives/vendor/2000-q1/0035.html
Reference: XF:linux-imap-remote-unauthorized-access

SuSE Linux IMAP server allows remote attackers to bypass IMAP
authentication and gain privileges.

Modifications:
  ADDREF XF:linux-imap-remote-unauthorized-access

INFERRED ACTION: CAN-2000-0233 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Stracener, Northcutt, Armstrong
   MODIFY(1) Frech
   NOOP(2) Cole, LeBlanc

Comments:
 Frech> XF:linux-imap-remote-unauthorized-access


=================================
Candidate: CAN-2000-0234
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: CF
Reference: BUGTRAQ:20000330 Cobalt apache configuration exposes .htaccess
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000330220757.28456.qmail@securityfocus.com
Reference: CONFIRM:http://www.securityfocus.com/templates/advisory.html?id=2150
Reference: BID:1083
Reference: URL:http://www.securityfocus.com/bid/1083
Reference: XF:cobalt-raq-remote-access

The default configuration of Cobalt RaQ2 and RaQ3 as specified in
access.conf allows remote attackers to view sensitive contents of a
.htaccess file.

Modifications:
  ADDREF XF:cobalt-raq-remote-access

INFERRED ACTION: CAN-2000-0234 ACCEPT (3 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Stracener, Northcutt
   MODIFY(1) Frech
   NOOP(3) Cole, LeBlanc, Armstrong

Comments:
 Frech> XF:cobalt-raq-remote-access


=================================
Candidate: CAN-2000-0235
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: FREEBSD:FreeBSD-SA-00:10
Reference: URL:ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:10-orville-write.asc
Reference: BID:1070
Reference: URL:http://www.securityfocus.com/bid/1070
Reference: XF:freebsd-orvillewrite-bo

Buffer overflow in the huh program in the orville-write package allows
local users to gain root privileges.

Modifications:
  ADDREF XF:freebsd-orvillewrite-bo

INFERRED ACTION: CAN-2000-0235 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Stracener, Northcutt, Armstrong
   MODIFY(1) Frech
   NOOP(2) Cole, LeBlanc

Comments:
 Frech> XF:freebsd-orvillewrite-bo


=================================
Candidate: CAN-2000-0245
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: BUGTRAQ:20000328 Objectserver vulnerability
Reference: URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218@blaze.arl.mil
Reference: SGI:20000303-01-PX
Reference: URL:ftp://sgigate.sgi.com/security/20000303-01-PX
Reference: XF:irix-objectserver-create-accounts
Reference: BID:1079
Reference: URL:http://www.securityfocus.com/bid/1079

Vulnerability in SGI IRIX objectserver daemon allows remote attackers
to create user accounts.

Modifications:
  ADDREF XF:irix-objectserver-create-accounts

INFERRED ACTION: CAN-2000-0245 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(1) Cole
   MODIFY(1) Frech

Comments:
 Frech> XF:irix-objectserver-create-accounts


=================================
Candidate: CAN-2000-0246
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000412
Assigned: 20000412
Category: SF
Reference: MS:MS00-019
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-019.asp
Reference: MSKB:Q249599
Reference: URL:http://www.microsoft.com/technet/support/kb.asp?ID=249599
Reference: BID:1081
Reference: URL:http://www.securityfocus.com/bid/1081
Reference: XF:iis-virtual-unc-share

IIS 4.0 and 5.0 does not properly perform ISAPI extension processing
if a virtual directory is mapped to a UNC share, which allows remote
attackers to read the source code of ASP and other files, aka the
"Virtualized UNC Share" vulnerability.

Modifications:
  ADDREF XF:iis-virtual-unc-share
  DESC include "Virtualized UNC Share" phrase.

INFERRED ACTION: CAN-2000-0246 ACCEPT_ACK (2 accept, 2 ack, 0 review)

Current Votes:
   ACCEPT(1) Cole
   MODIFY(1) Frech
   NOOP(1) Christey

Comments:
 Frech> XF:iis-virtual-unc-share
 Christey> Modify desc to include "Virtualized UNC Share" phrase.


=================================
Candidate: CAN-2000-0258
Published:
Final-Decision:
Interim-Decision: 20000530
Modified:
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: MS:MS00-023
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-023.asp
Reference: BID:1101
Reference: URL:http://www.securityfocus.com/bid/1101

IIS 4.0 and 5.0 allows remote attackers to cause a denial of service
by sending many URLs with a large number of escaped characters, aka
the "Myriad Escaped Characters" Vulnerability.

INFERRED ACTION: CAN-2000-0258 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Wall, Cole


=================================
Candidate: CAN-2000-0260
Published:
Final-Decision:
Interim-Decision: 20000530
Modified:
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: MS:MS00-025
Reference: URL:http://www.microsoft.com/technet/security/bulletin/ms00-025.asp
Reference: BID:1109
Reference: URL:http://www.securityfocus.com/bid/1109

Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0
allows users to cause a denial of service or execute commands, aka
the "Link View Server-Side Component" vulnerability.

INFERRED ACTION: CAN-2000-0260 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Wall, Cole


=================================
Candidate: CAN-2000-0267
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: CISCO:20000419 Cisco Catalyst Enable Password Bypass Vulnerability
Reference: URL:http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml
Reference: XF:cisco-catalyst-password-bypass
Reference: BID:1122
Reference: URL:http://www.securityfocus.com/bid/1122

Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode
without a password.

Modifications:
  ADDREF XF:cisco-catalyst-password-bypass

INFERRED ACTION: CAN-2000-0267 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Cole, Stracener, Northcutt
   MODIFY(1) Frech
   NOOP(3) Wall, LeBlanc, Armstrong

Comments:
 Frech> XF:cisco-catalyst-password-bypass


=================================
Candidate: CAN-2000-0268
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: CISCO:20000420 Cisco IOS Software TELNET Option Handling Vulnerability
Reference: URL:http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml
Reference: BID:1123
Reference: URL:http://www.securityfocus.com/bid/1123
Reference: XF:cisco-ios-option-handling

Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of
service by sending the ENVIRON option to the Telnet daemon before it
is ready to accept it, which causes the system to reboot.

Modifications:
  ADDREF XF:cisco-ios-option-handling

INFERRED ACTION: CAN-2000-0268 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Cole, Stracener, Northcutt
   MODIFY(1) Frech
   NOOP(3) Wall, LeBlanc, Armstrong

Comments:
 Frech> ADDREF XF:cisco-ios-option-handling


=================================
Candidate: CAN-2000-0274
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: BUGTRAQ:20000410 linux trustees 1.5 long path name vulnerability
Reference: URL:http://archives.neohapsis.com/archives/bugtraq/2000-04/0035.html
Reference: CONFIRM:http://www.braysystems.com/linux/trustees.html
Reference: XF:linux-trustees-patch-dos
Reference: BID:1096
Reference: URL:http://www.securityfocus.com/bid/1096

The Linux trustees kernel patch allows attackers to cause a denial of
service by accessing a file or directory with a long name.

Modifications:
  ADDREF XF:linux-trustees-patch-dos

INFERRED ACTION: CAN-2000-0274 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Cole, Stracener, Northcutt
   MODIFY(1) Frech
   NOOP(4) Wall, Christey, LeBlanc, Armstrong

Comments:
 Christey> This problem is confirmed in the News section for Mar 31,2000,
 Christey> which mentions "a fix for the 'extra long directory name' problem."
 Frech> XF:linux-trustees-patch-dos


=================================
Candidate: CAN-2000-0277
Published:
Final-Decision:
Interim-Decision: 20000530
Modified:
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: MS:MS00-022
Reference: URL:http://www.microsoft.com/technet/security/bulletin/MS00-022.asp
Reference: BID:1087
Reference: URL:http://www.securityfocus.com/bid/1087

Microsoft Excel 97 and 2000 does not warn the user when executing
Excel Macro Language (XLM) macros in external text files, which could
allow an attacker to execute a macro virus, aka the "XLM Text Macro"
vulnerability.

INFERRED ACTION: CAN-2000-0277 ACCEPT_ACK (2 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Wall, Cole


=================================
Candidate: CAN-2000-0294
Published:
Final-Decision:
Interim-Decision: 20000530
Modified: 20000526-01
Proposed: 20000426
Assigned: 20000426
Category: SF
Reference: FREEBSD:FreeBSD-SA-00:12
Reference: URL:http://www.securityfocus.com/templates/advisory.html?id=2162
Reference: BID:1107
Reference: URL:http://www.securityfocus.com/bid/1107
Reference: XF:freebsd-healthd

Buffer overflow in healthd for FreeBSD allows local users to gain root
privileges.

Modifications:
  ADDREF XF:freebsd-healthd

INFERRED ACTION: CAN-2000-0294 ACCEPT (4 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(3) Cole, Stracener, Northcutt
   MODIFY(1) Frech
   NOOP(3) Wall, LeBlanc, Armstrong

Comments:
 Frech> XF:freebsd-healthd

 
Page Last Updated: May 22, 2007