[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

MODIFY-01 cluster: 25 CERT candidates moved to MODIFICATION phase




All:

The following 25 candidates have been moved to the MODIFICATION phase.
They represent the bulk of the CERT cluster that I haven't made a
Final Decision on yet.  I have defined a MODIFY-01 cluster to hold
these vulnerabilities.

I expect to move these candidates to Interim Decision by Friday June
25, barring any issues raised by the Editorial Board; so I expect to
make a Final Decision on these by 6/30.

1) I have changed the candidates slightly to reflect board members'
comments.  These changes are explicitly noted in the candidate list.

2) Editorial Board members need to re-vote for these candidates.  In
the next email, I will list people's votes for the original
candidates.

3) I've changed the format of the candidate list slightly.  It
includes the dates of each phase for the candidate, and a specific
line for you to fill in your vote.  Please list your vote on the VOTE:
line after each candidate, and reply with the full text.  I know this
takes up bytes, but I've been tallying votes manually and I'm getting
concerned about making some mistakes.  I hope to refine this process
as time goes on.

4) Most of the modifications involve adding references to the X-Force
database; some involve minor changes to the description text.


Thanks,
- Steve



Summary of votes to use (in ascending order of "severity"):

ACCEPT - member accepts the candidate as proposed
NOOP - member has no opinion on the candidate
MODIFY - member wants to change some minor detail (e.g. reference/description)
REVIEWING - member is reviewing/researching the candidate
RECAST - candidate must be significantly modified, e.g. split or merged
REJECT - candidate is "not a vulnerability", or a duplicate, etc.

Please write your vote on the line that starts with "VOTE: ".  If you
want to add comments or details, add them to lines after the VOTE: line.


=================================
Candidate: CAN-1999-0003
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:aix-ttdbserver
Reference: XF:tooltalk
Reference: CERT:CA-98.11.tooltalk
Reference: NAI:NAI-29
Reference: SGI:19981101-01-A
Reference: SGI:19981101-01-PX

Execute commands as root via buffer overflow in Tooltalk database
server (rpc.ttdbserverd)

Modifications:
  ADDREF XF:aix-ttdbserver
  ADDREF XF:tooltalk

VOTE: 

=================================
Candidate: CAN-1999-0004
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.10.mime_buffer_overflows
Reference: XF:outlook-long-name
Reference: SUN:00175

MIME buffer overflow in email clients, e.g. Solaris mailtool
and Outlook.

Modifications:
  ADDREF MS:MS98-008
  DESC include Outlook

VOTE: 

=================================
Candidate: CAN-1999-0018
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.26.statd
Reference: XF:statd
Reference: AUSCERT:AA-97.29

Buffer overflow in statd allows root privileges.

Modifications:
  DESC remove CERT advisory from text

VOTE: 

=================================
Candidate: CAN-1999-0035
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ftp-ftpd
Reference: CERT:CA-97.16.ftpd
Reference: AUSCERT:AA-97.03

Race condition in signal handling routine in ftpd, allowing read/write
arbitrary files.

Modifications:
  ADDREF XF:ftp-ftpd

VOTE: 

=================================
Candidate: CAN-1999-0046
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.06.rlogin-term
Reference: XF:rlogin-termbo

Buffer overflow of rlogin program using TERM environmental variable

Modifications:
  DELREF XF:bsdi-rlogind
  ADDREF XF:rlogin-termbo

VOTE: 

=================================
Candidate: CAN-1999-0049
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sgi-csetup
Reference: CERT:CA-97.03.csetup

Csetup under IRIX allows arbitrary file creation or overwriting.

Modifications:
  ADDREF XF:sgi-csetup

VOTE: 

=================================
Candidate: CAN-1999-0051
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sgi-licensemanager
Reference: CERT:CA-97.01.flex_lm
Reference: AUSCERT:AA-96.03

Arbitrary file creation and program execution using FLEXlm
LicenseManager, from versions 4.0 to 5.0, in IRIX.

Modifications:
  ADDREF XF:sgi-licensemanager

VOTE: 

=================================
Candidate: CAN-1999-0078
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.08.pcnfsd
Reference: XF:rpc-pcnfsd

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions,
or execute arbitrary commands through arguments in the RPC call.

Modifications:
  DELREF XF:nfs-pcnfsd

VOTE: 

=================================
Candidate: CAN-1999-0099
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-95.13.syslog.vul
Reference: XF:smtp-syslog

A buffer overflow in the syslog utility allows remote execution
through Sendmail and possibly other mail servers.

Modifications:
  DESC could be through other mailers besides Sendmail

VOTE: 

=================================
Candidate: CAN-1999-0117
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ibm-passwd
Reference: CERT:CA-92:07.AIX.passwd.vulnerability

AIX passwd allows local users to gain root access.

Modifications:
  ADDREF XF:ibm-passwd

VOTE: 

=================================
Candidate: CAN-1999-0128
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ping-death
Reference: CERT:CA-96.26.ping

Oversized ICMP ping packets can result in a denial of service,
aka Ping o' Death.

Modifications:
  ADDREF XF:ping-death
  COMMENT Andre's other suggested ref's were for a buffer overflow
  COMMENT in the ping program, which is a different vulnerability.
  DESC slight wording change to identify this as Ping o' Death *only*

VOTE: 

=================================
Candidate: CAN-1999-0130
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sendmail-daemon-mode
Reference: CERT:CA-96.24.sendmail.daemon.mode

Local users can start Sendmail in daemon mode and gain root privileges.

Modifications:
  ADDREF XF:sendmail-daemon-mode

VOTE: 

=================================
Candidate: CAN-1999-0131
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:smtp-875bo
Reference: CERT:CA-96.20.sendmail_vul

Buffer overflow and denial of service in Sendmail 8.7.5 and
earlier through GECOS field gives root access to local users.

Modifications:
  ADDREF XF:smtp-875bo

VOTE: 

=================================
Candidate: CAN-1999-0132
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:expreserve
Reference: CERT:CA-96.19.expreserve
Reference: XF:expreserve

Expreserve, used in vi and ex, allows local users to overwrite
arbitrary files and gain root access.

Modifications:
  ADDREF XF:expreserve

VOTE: 

=================================
Candidate: CAN-1999-0134
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sol-voldtmp
Reference: CERT:CA-96.17.Solaris_vold_vul
Reference: AUSCERT:AL-96.04

vold in Solaris 2.x allows local users to gain root access

Modifications:
  ADDREF XF:sol-voldtmp

VOTE: 

=================================
Candidate: CAN-1999-0135
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sun-admintool
Reference: CERT:CA-96.16.Solaris_admintool_vul
Reference: AUSCERT:AL-96.03

admintool in Solaris allows a local user to write to arbitrary files
and gain root access.

Modifications:
  ADDREF XF:sun-admintool

VOTE: 

=================================
Candidate: CAN-1999-0136
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sol-KCMSvuln
Reference: AUSCERT:AL-96.02
Reference: CERT:CA-96.15.Solaris_KCMS_vul

Kodak Color Management System (KCMS) on Solaris allows a local user to
write to arbitrary files and gain root access.

Modifications:
  ADDREF XF:sol-KCMSvuln

VOTE: 

=================================
Candidate: CAN-1999-0137
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:linux-dipbo
Reference: CERT:CA-96.13.dip_vul
Reference: XF:dip-bo

The dip program on many Linux systems allows local users to gain root
access via a buffer overflow.

Modifications:
  ADDREF XF:linux-dipbo

VOTE: 

=================================
Candidate: CAN-1999-0141
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:http-java-applet
Reference: CERT:CA-96.07.java_bytecode_verifier
Reference: SUN:00134

Java Bytecode Verifier allowed malicious applets to execute
arbitrary commands as the user of the applet.

Modifications:
  ADDREF XF:http-java-applet

VOTE: 

=================================
Candidate: CAN-1999-0155
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:gscript-dsafer
Reference: CERT:CA-95.10.ghostscript

The ghostscript command with the -dSAFER option allows remote
attackers to execute commands.

Modifications:
  ADDREF XF:gscript-dsafer

VOTE: 

=================================
Candidate: CAN-1999-0164
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:sol-pstmprace
Reference: AUSCERT:AA-95.07
Reference: CERT:CA-95.09.Solaris.ps.vul

A race condition in the Solaris ps command allows an attacker to
overwrite critical files.

Modifications:
  ADDREF XF:sol-pstmprace

VOTE: 

=================================
Candidate: CAN-1999-0208
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:rpc-update
Reference: CERT:CA-95.17.rpc.ypupdated.vul

rpc.ypupdated (NIS) allowed remote users to execute arbitrary commands.

Modifications:
  ADDREF XF:rpc-update

VOTE: 

=================================
Candidate: CAN-1999-0209
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:selsvc
Reference: CERT:CA-90.05.sunselection.vulnerability

The SunView (SunTools) selection_svc facility allows remote users to
read files.

Modifications:
  ADDREF XF:selsvc

VOTE: 

=================================
Candidate: CAN-1999-0267
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:http-port
Reference: CERT:CA-95.04.NCSA.http.daemon.for.unix.vulnerability

Buffer overflow in NCSA HTTP daemon v1.3 allowed remote command execution.

Modifications:
  ADDREF XF:http-port

VOTE: 

=================================
Candidate: CAN-1999-0277
Published: 
Final-Decision: 
Interim-Decision: 
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:workman
Reference: CERT:CA-96.23.workman_vul

The WorkMan program can be used to overwrite any file to get root access.

Modifications:
  ADDREF XF:workman

VOTE: 

Page Last Updated or Reviewed: May 22, 2007