[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

FINAL DECISION: ACCEPT 47 various candidates



I have made a Final Decision to ACCEPT the following candidates.
These candidates are now assigned CVE names as noted below.  Voting
details and comments are provided afterwards.

The CVE names for candidates that reach Final Decision should be
regarded as stable.  In the case of these and all other candidates
that reach Final Decision during this validation period, accepted
candidates won't reach Publication phase until the CVE goes fully
public.  The only difference between Publication and Final Decision is
that the CVE name is officially "announced" by MITRE during
Publication.

- Steve


Candidate	CVE Name
---------	----------
CAN-1999-0018	CVE-1999-0018
CAN-1999-0032	CVE-1999-0032
CAN-1999-0046	CVE-1999-0046
CAN-1999-0062	CVE-1999-0062
CAN-1999-0067	CVE-1999-0067
CAN-1999-0081	CVE-1999-0081
CAN-1999-0082	CVE-1999-0082
CAN-1999-0083	CVE-1999-0083
CAN-1999-0097	CVE-1999-0097
CAN-1999-0099	CVE-1999-0099
CAN-1999-0120	CVE-1999-0120
CAN-1999-0128	CVE-1999-0128
CAN-1999-0132	CVE-1999-0132
CAN-1999-0185	CVE-1999-0185
CAN-1999-0190	CVE-1999-0190
CAN-1999-0208	CVE-1999-0208
CAN-1999-0228	CVE-1999-0228
CAN-1999-0252	CVE-1999-0252
CAN-1999-0294	CVE-1999-0294
CAN-1999-0295	CVE-1999-0295
CAN-1999-0303	CVE-1999-0303
CAN-1999-0305	CVE-1999-0305
CAN-1999-0308	CVE-1999-0308
CAN-1999-0310	CVE-1999-0310
CAN-1999-0311	CVE-1999-0311
CAN-1999-0312	CVE-1999-0312
CAN-1999-0313	CVE-1999-0313
CAN-1999-0314	CVE-1999-0314
CAN-1999-0316	CVE-1999-0316
CAN-1999-0324	CVE-1999-0324
CAN-1999-0325	CVE-1999-0325
CAN-1999-0328	CVE-1999-0328
CAN-1999-0332	CVE-1999-0332
CAN-1999-0340	CVE-1999-0340
CAN-1999-0341	CVE-1999-0341
CAN-1999-0342	CVE-1999-0342
CAN-1999-0344	CVE-1999-0344
CAN-1999-0357	CVE-1999-0357
CAN-1999-0374	CVE-1999-0374
CAN-1999-0396	CVE-1999-0396
CAN-1999-0468	CVE-1999-0468
CAN-1999-0471	CVE-1999-0471
CAN-1999-0472	CVE-1999-0472
CAN-1999-0473	CVE-1999-0473
CAN-1999-0474	CVE-1999-0474
CAN-1999-0475	CVE-1999-0475
CAN-1999-0485	CVE-1999-0485






=================================
Candidate: CAN-1999-0018
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990621-01
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.26.statd
Reference: XF:statd
Reference: AUSCERT:AA-97.29

Buffer overflow in statd allows root privileges.

Modifications:
  DESC remove CERT advisory from text

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0032
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.19.bsdlp
Reference: AUSCERT:AA-96.12
Reference: CIAC:I-042
Reference: SGI:19980402-01-PX
Reference: XF:bsd-lprbo2
Reference: XF:bsd-lprbo
Reference: XF:lpr-bo

Buffer overflow in BSD-based lpr package allows local users to gain
root privileges.

Modifications:
  DESC remove lp, reword
  ADDREF XF:bsd-lprbo
  ADDREF XF:lpr-bo

VOTES:
   ACCEPT(3) Northcutt, Hill, Wall
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> the mention of (lp) is misleading.  The problem was with
 Shostack> the BSD lpr family, not the SYSV lp family.
 Frech> References: XF:bsd-lprbo
 Frech> References: XF:lpr-bo


=================================
Candidate: CAN-1999-0046
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-02
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.06.rlogin-term
Reference: XF:rlogin-termbo

Buffer overflow of rlogin program using TERM environmental variable.

Modifications:
  DELREF XF:bsdi-rlogind
  ADDREF XF:rlogin-termbo
  DESC Add period.

VOTES:
   ACCEPT(3) Shostack, Northcutt, Landfield
   MODIFY(1) Frech

COMMENTS:
 Frech> Every sentence is followed by a period (unless you are a criminal,
 Frech> and then it follows with an appeal.)


=================================
Candidate: CAN-1999-0062
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:openbsd-chpass
Reference: NAI:NAI-28

The chpass command in OpenBSD allows a local user to gain root access
through file descriptor leakage.

Modifications:
  DESC per Prosser's comments
  ADDREF NAI:NAI-28

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> I believe this is a file leakage problem where the temp
 Prosser> password file can be modified and used to overwrite the original
 Prosser> password file.  The reference source for this is a NAI Security
 Prosser> Advisory #28, no longer available from the now defunct old NAI site
 Prosser> but is on Bugtraq
 Prosser> http://netspace.org/cgi-bin/wa?A2=ind9808B&L=bugtraq&P=R455


=================================
Candidate: CAN-1999-0067
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.06.cgi_example_code
Reference: XF:http-cgi-phf

CGI phf program allows remote command execution through shell
metacharacters.

Modifications:
  DESC reword slightly

VOTES:
   ACCEPT(4) Hill, Shostack, Frech, Wall
   MODIFY(2) Northcutt, Christey

COMMENTS:
 Northcutt> this is not about phf it is about escape_shell_cmd(),
 Northcutt> you had the same thing with php and so forth.
 Christey> I agree with Adam that "shell metacharacters" is too high a level of
 Christey> abstraction.  I believe that phf and php and the others should be
 Christey> distinguished.  However, it might be better to change the description
 Christey> to say "CGI phf program allows remote command execution via shell
 Christey> metacharacters."


=================================
Candidate: CAN-1999-0081
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:ftp-rnfr

wu-ftp allows files to be overwritten via the rnfr command.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0082
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:ftp-cwd
Reference: FarmerVenema:Improving the Security of Your Site by Breaking Into it

CWD ~root command in ftpd allows root access.

Modifications:
  DESC reword

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(2) Shostack, Prosser

COMMENTS:
 Shostack> 'in ftpD allows root access'
 Prosser> Dan Farmer and Wietse Venema covered this vulnerability as
 Prosser> well in their guide "Improving the Security of Your Site by Breaking
 Prosser> Into it"


=================================
Candidate: CAN-1999-0083
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:cwdleak

getcwd() file descriptor leak in FTP

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0097
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: ERS:ERS-SVA-E01-1997:009.1
Reference: XF:ibm-ftp

The AIX FTP client can be forced to execute commands from a malicious
server through shell metacharacters (e.g. a pipe character).

Modifications:
  ADDREF XF:ibm-ftp
  DESC slight change

VOTES:
   ACCEPT(2) Shostack, Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Northcutt> Per 97, general issue of mishandling metachars is a lot
 Northcutt> like my comment about CGI-BINs (not just PHF) [Someone]
 Northcutt> recently did a content search for about
 Northcutt> CGI-BIN and /etc/passwd and found about 10 cig programs
 Northcutt> that someone attempted to exploit...  However we resolve the
 Northcutt> CGI-BIN bit, we ought to consider applying the same logic to
 Northcutt> candidates like 97.
 Frech> Reference: XF:ibm-ftp
 Prosser> Concur with Adam's modification


=================================
Candidate: CAN-1999-0099
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-02
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-95.13.syslog.vul
Reference: XF:smtp-syslog

Buffer overflow in syslog utility allows local or remote attackers to
gain root privileges.

Modifications:
  DESC could be through other mailers besides Sendmail
  DESC applies to syslog period, not just mail servers

VOTES:
   ACCEPT(3) Frech, Northcutt, Landfield
   MODIFY(1) Shostack

COMMENTS:
 Shostack> Anything that passes bad data to syslog might be used to proxy this,
 Shostack> not just mail servers.


=================================
Candidate: CAN-1999-0120
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: CERT:CA-94.06.utmp.vulnerability
Reference: XF:utmp-write

Sun/Solaris utmp file allows local users to gain root access if it
is writable by users other than root.

VOTES:
   ACCEPT(5) Northcutt, Shostack, Prosser, Baker, Frech

COMMENTS:
 Shostack> |


=================================
Candidate: CAN-1999-0128
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990621-01
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ping-death
Reference: CERT:CA-96.26.ping

Oversized ICMP ping packets can result in a denial of service,
aka Ping o' Death.

Modifications:
  ADDREF XF:ping-death
  COMMENT Andre's other suggested ref's were for a buffer overflow
  COMMENT in the ping program, which is a different vulnerability.
  DESC slight wording change to identify this as Ping o' Death *only*

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0132
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990621-01
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: XF:expreserve
Reference: CERT:CA-96.19.expreserve

Expreserve, used in vi and ex, allows local users to overwrite
arbitrary files and gain root access.

Modifications:
  ADDREF XF:expreserve

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0185
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00156
Reference: XF:sun-ftpd/logind

In SunOS or Solaris, a remote user could connect from an FTP server's
data port to an rlogin server on a host that trusts the FTP server,
allowing remote command execution.

Modifications:
  DESC wording change
  ADDREF XF:sun-ftpd/logind

VOTES:
   ACCEPT(2) Northcutt, Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> Also reported as vulnerable on SunOS, which is similar, but different.
 Frech> Reference: XF:sun-ftpd/logind


=================================
Candidate: CAN-1999-0190
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00167
Reference: XF:sun-rpcbind

Solaris rpcbind can be exploited to overwrite arbitrary files and gain
root access.

Modifications:
  ADDREF XF:sun-rpcbind

VOTES:
   ACCEPT(1) Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> Reference: XF:sun-rpcbind
 Prosser> The way rpcbind handles indirect calls is vulnerable in this advisory.
 Prosser> As there are lots of rpcbind problems, maybe should be more specific?


=================================
Candidate: CAN-1999-0208
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-02
Proposed: 19990607
Assigned: 19990607
Category: SF
Reference: XF:rpc-update
Reference: CERT:CA-95.17.rpc.ypupdated.vul

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.

Modifications:
  ADDREF XF:rpc-update
  DESC change to present tense

VOTES:
   ACCEPT(3) Shostack, Northcutt, Landfield
   MODIFY(1) Frech

COMMENTS:
 Frech> "allows remote users..." since this vuln's context pertains to
 Frech> when the service was vulnerable.


=================================
Candidate: CAN-1999-0228
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:nt-rpc-ver
Reference: MSKB:Q162567

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

Modifications:
  ADDREF MSKB:Q162567

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> this is a 100% CPU utilization through the rpc port 135
 Prosser> on an NT box. Source is Microsoft Knowledge Base article Q162567


=================================
Candidate: CAN-1999-0252
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:smtp-listserv

Buffer overflow in listserv allows arbitrary command execution.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0294
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:nt-wins-snmp2

All records in a WINS database can be deleted through SNMP for
a denial of service.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0295
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:sun-sysdef
Reference: SUN:00157

Solaris sysdef command allows local users to read kernel memory,
potentially leading to root privileges.

VOTES:
   ACCEPT(5) Northcutt, Shostack, Prosser, Baker, Frech

COMMENTS:
 Prosser> reference though should be Sun Security Bulletin 00157


=================================
Candidate: CAN-1999-0303
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:bnu-uucpd-bo
Reference: RSI:RSI.0002.05-18-98.BNU.UUCPD

Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.

Modifications:
  ADDREF RSI:RSI.0002.05-18-98.BNU.UUCPD

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> source should be REPSEC Security Advisory
 Prosser> RSI.0002.05-18-98.BNU.UUCPD


=================================
Candidate: CAN-1999-0305
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:bsd-sourceroute
Reference: OPENBSD:Feb15,1998 "IP Source Routing Problem"

BSD sysctl control does not properly restrict source routing.

Modifications:
  ADDREF OPENBSD:Feb15,1998

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> reference:  OpenBSD Security Advisory February 15, 1998 IP
 Prosser> Source Routing Problem


=================================
Candidate: CAN-1999-0308
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: HP:HPSBUX9410-018
Reference: XF:hpux-gwind-overwrite
Reference: CIAC:H-03: HP-UX suid Vulnerabilities

HP-UX gwind program allows users to modify arbitrary files.

Modifications:
  ADDREF HP:HPSBUX9410-018

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> add source HP Security Bulletin HPSBUX9410-018


=================================
Candidate: CAN-1999-0310
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:ssh-1225

SSH 1.2.25 on HP-UX allows access to new user accounts.

VOTES:
   ACCEPT(4) Northcutt, Prosser, Baker, Frech
   NOOP(1) Shostack


=================================
Candidate: CAN-1999-0311
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:hpux-fpkg2swpk
Reference: HP:HPSBUX9612-042

fpkg2swpk in HP-UX allows local users to gain root access.

Modifications:
  ADDREF HP:HPSBUX9612-042

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> add source:  HP Security Advisory HPSBUX9612-042


=================================
Candidate: CAN-1999-0312
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:nis-ypbind
Reference: CERT:CA-93:01.REVISED.HP.NIS.ypbind.vulnerability

HP ypbind allows attackers with root privileges to modify NIS data.

Modifications:
  ADDREF CERT:CA-93:01.REVISED.HP.NIS.ypbind.vulnerability

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> Source is an older CERT Bulletin CA-93.1, Revised
 Prosser> Hewlett-Packard NIS ypbind Vulnerability


=================================
Candidate: CAN-1999-0313
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:sgi-disk-bandwidth
Reference: SGI:19980701-01-P

IRIX disk_bandwidth program allows local users to gain root access
using relative pathnames.

Modifications:
  ADDREF SGI:19980701-01-P

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> Source is SGI Security Advisory 19980701-01-P


=================================
Candidate: CAN-1999-0314
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:sgi-ioconfig
Reference: SGI:19980701-01-P

IRIX ioconfig program allows local users to gain root access
using relative pathnames.

Modifications:
  ADDREF SGI:19980701-01-P

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> Source is SGI Security Advisory 19980701-01-P


=================================
Candidate: CAN-1999-0316
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:linux-splitvt
Reference: CIAC:G-08

Buffer overflow in Linux splitvt command gives root access to local
users.

Modifications:
  ADDREF CIAC:G-08

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> Source is CIAC Bulletin G-08


=================================
Candidate: CAN-1999-0324
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: HP:HPSBUX9702-053
Reference: CIAC:H-31
Reference: XF:hp-ppllog

ppl program in HP-UX allows local users to create root files through
symlinks.

Modifications:
  ADDREF CIAC:H-31
  ADDREF HP:HPSBUX9702-053

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> reference CIAC Bulletin H-31, HP Security Bulletin
 Prosser> HPSBUX9702-053


=================================
Candidate: CAN-1999-0325
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:hp-vhe
Reference: HP:HPSBUX9406-013

vhe_u_mnt program in HP-UX allows local users to create root files through
symlinks.

Modifications:
  ADDREF HP:HPSBUX9406-013

VOTES:
   ACCEPT(3) Northcutt, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Shostack

COMMENTS:
 Prosser> reference:  HPSBUX9406-013


=================================
Candidate: CAN-1999-0328
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: SGI:19971103-01-PX
Reference: XF:sgi-permtool

SGI permissions program allows local users to gain root privileges.

Modifications:
  ADDREF XF:sgi-permtool

VOTES:
   ACCEPT(1) Northcutt
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> include a path to /usr/bin/permissions to clarify that it is a
 Shostack> program.
 Frech> Reference: XF:sgi-permtool


=================================
Candidate: CAN-1999-0332
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:nt-netmeeting
Reference: MSKB:Q184346

Buffer overflow in NetMeeting allows denial of service and remote
command execution.

Modifications:
  ADDREF MSKB:Q184346

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser
   NOOP(1) Christey

COMMENTS:
 Shostack> All BOs can be dos attacks.  When should or should not that be listed?
 Prosser> reference:
 Prosser> www.microsoft.com/windows/ie/security/netmbuff.asp, Knowledgebase
 Prosser> Q184346
 Christey> The DoS (a crash) occurs before the exploit, so both cases
 Christey> should be listed here.


=================================
Candidate: CAN-1999-0340
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: KSRT:005
Reference: XF:linux-crond

Buffer overflow in Linux Slackware crond program allows local users
to gain root access.

Modifications:
  ADDREF KSRT:005

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser

COMMENTS:
 Prosser> advisory comes from KSRT, KSR[T] Advisory #005
 Prosser> Date:   Dec  6, 1997


=================================
Candidate: CAN-1999-0341
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: KSRT:006
Reference: XF:linux-deliver

Buffer overflow in the Linux mail program "deliver" allows local users
to gain root access.

Modifications:
  ADDREF KSRT:006

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser

COMMENTS:
 Prosser> advisory comes from KSRT, Advisory #006
 Prosser> Date:   Jan 14, 1998


=================================
Candidate: CAN-1999-0342
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: REDHAT:http://www.redhat.com/corp/support/errata/rh42-errata-general.html#pam
Reference: XF:linux-pam-passwd-tmprace

Linux PAM modules allow local users to gain root access using
temporary files.

Modifications:
  ADDREF REDHAT:http://www.redhat.com/corp/support/errata/rh42-errata-general.html#pam

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> one source from Bugtraq, another from
 Prosser> http://www.redhat.com/corp/support/errata/rh42-errata-general.html#pam


=================================
Candidate: CAN-1999-0344
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: MS:MS98-009
Reference: MSKB:Q190288
Reference: XF:nt-priv-fix

NT users can gain debug-level access on a system process using the
Sechole exploit.

Modifications:
  ADDREF MS:MS98-009
  ADDREF MSKB:Q190288

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> Source: MS Bulletin ms98-009 and Microssoft Knowledge
 Prosser> Base article Q190288


=================================
Candidate: CAN-1999-0357
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Jan25,1999
Reference: XF:win98-oshare-dos

Denial of service in Windows systems using malformed oshare packets.

Modifications:
  ADDREF XF:win98-oshare-dos

VOTES:
   ACCEPT(3) Northcutt, Shostack, Baker
   MODIFY(1) Frech
   NOOP(1) Prosser

COMMENTS:
 Frech> XF:win98-oshare-dos


=================================
Candidate: CAN-1999-0374
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: DEBIAN:19990215
Reference: BUGTRAQ:Feb16,1999
Reference: XF:linux-cfengine-symlinks

Debian Linux cfengine package is susceptible to a symlink attack.

Modifications:
  ADDREF DEBIAN:19990215
  ADDREF XF:linux-cfengine-symlinks

VOTES:
   ACCEPT(3) Northcutt, Shostack, Baker
   MODIFY(1) Frech
   NOOP(1) Prosser

COMMENTS:
 Frech> XF:linux-cfengine-symlinks


=================================
Candidate: CAN-1999-0396
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: NETBSD:1999-001
Reference: OPENBSD:Feb17,1999
Reference: XF:netbsd-tcp-race

A race condition between the select() and accept() calls in NetBSD TCP
servers allows remote attackers to cause a denial of service.

Modifications:
  ADDREF XF:netbsd-tcp-race

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.
 Frech> Reference: XF:netbsd-tcp-race


=================================
Candidate: CAN-1999-0468
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: MS:MS99-012
Reference: XF:ie-scriplet-fileread
Reference: BUGTRAQ:Apr9,1999

Internet Explorer 5.0 allows a remote server to read arbitrary files
on the client's file system using the Microsoft Scriptlet Component.

Modifications:
  ADDREF MS:MS99-012

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> Source:  MS bulletin ms99-012


=================================
Candidate: CAN-1999-0471
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:winroute-config
Reference: BUGTRAQ:Apr9,1999

The remote proxy server in Winroute allows a remote attacker to
reconfigure the proxy without authentication through the "cancel"
button.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0472
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:netcache-snmp
Reference: BUGTRAQ:Apr7,1999

The SNMP default community name "public" is not properly removed in
NetApps C630 Netcache, even if the administrator tries to disable it.

Modifications:
  DESC Changed NetApps to NetApp per vendor usage

VOTES:
   ACCEPT(3) Northcutt, Shostack, Baker
   MODIFY(1) Frech
   NOOP(1) Prosser

COMMENTS:
 Frech> Verify that the company's name is not correctly spelled Network Appliances.
 Frech> XF Reference is ok.


=================================
Candidate: CAN-1999-0473
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: CALDERA:CSSA-1999:010.0
Reference: XF:rsync-permissions
Reference: BUGTRAQ:Apr7,1999

The rsync command before rsync 2.3.1 may inadvertently change the
permissions of the client's working directory to the permissions of
the directory being transferred.

Modifications:
  ADDREF CALDERA:CSSA-1999:010.0

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> Source:  Caldera Security Advisory CSSA-1999:010.0


=================================
Candidate: CAN-1999-0474
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:icq-webserver-read
Reference: BUGTRAQ:Apr5,1999

The ICQ Webserver allows remote attackers to use .. to access
arbitrary files outside of the user's personal directory.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0475
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified:
Proposed: 19990714
Assigned: 19990607
Category: SF
Reference: XF:procmail-race
Reference: BUGTRAQ:Apr5,1999

A race condition in how procmail handles .procmailrc files allows
a local user to read arbitrary files available to the user who is
running procmail.

VOTES:
   ACCEPT(4) Northcutt, Shostack, Baker, Frech
   NOOP(1) Prosser


=================================
Candidate: CAN-1999-0485
Published:
Final-Decision: 19990827
Interim-Decision: 19990823
Modified: 19990821-01
Proposed: 19990617
Assigned: 19990607
Category: SF
Reference: OPENBSD:Feb19,1999
Reference: XF:openbsd-ipintr-race

Remote attackers can cause a system crash through ipintr() in ipq in
OpenBSD.

Modifications:
  ADDREF XF:openbsd-ipintr-race
  DESC change DoS to system crash

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.
 Frech> Reference: XF:openbsd-ipintr-race

 
Page Last Updated: May 22, 2007