[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[FINAL] ACCEPT 53 candidates from various clusters



I have made a Final Decision to ACCEPT the following candidates.
These candidates are now assigned CVE names as noted below.  The
resulting CVE entries will be published in CVE version 20000322.
Voting details and comments are provided at the end of this report.

- Steve


Candidate	CVE Name
---------	----------
CAN-1999-0189	CVE-1999-0189
CAN-1999-0390	CVE-1999-0390
CAN-1999-0678	CVE-1999-0678
CAN-1999-0727	CVE-1999-0727
CAN-1999-0733	CVE-1999-0733
CAN-1999-0740	CVE-1999-0740
CAN-1999-0746	CVE-1999-0746
CAN-1999-0778	CVE-1999-0778
CAN-1999-0783	CVE-1999-0783
CAN-1999-0785	CVE-1999-0785
CAN-1999-0786	CVE-1999-0786
CAN-1999-0789	CVE-1999-0789
CAN-1999-0796	CVE-1999-0796
CAN-1999-0797	CVE-1999-0797
CAN-1999-0806	CVE-1999-0806
CAN-1999-0890	CVE-1999-0890
CAN-1999-0893	CVE-1999-0893
CAN-1999-0896	CVE-1999-0896
CAN-1999-0908	CVE-1999-0908
CAN-1999-0916	CVE-1999-0916
CAN-1999-0920	CVE-1999-0920
CAN-1999-0931	CVE-1999-0931
CAN-1999-0964	CVE-1999-0964
CAN-1999-0966	CVE-1999-0966
CAN-1999-0996	CVE-1999-0996
CAN-1999-0998	CVE-1999-0998
CAN-1999-1000	CVE-1999-1000
CAN-2000-0003	CVE-2000-0003
CAN-2000-0022	CVE-2000-0022
CAN-2000-0023	CVE-2000-0023
CAN-2000-0025	CVE-2000-0025
CAN-2000-0026	CVE-2000-0026
CAN-2000-0029	CVE-2000-0029
CAN-2000-0031	CVE-2000-0031
CAN-2000-0036	CVE-2000-0036
CAN-2000-0037	CVE-2000-0037
CAN-2000-0039	CVE-2000-0039
CAN-2000-0040	CVE-2000-0040
CAN-2000-0041	CVE-2000-0041
CAN-2000-0088	CVE-2000-0088
CAN-2000-0089	CVE-2000-0089
CAN-2000-0097	CVE-2000-0097
CAN-2000-0098	CVE-2000-0098
CAN-2000-0121	CVE-2000-0121
CAN-2000-0139	CVE-2000-0139
CAN-2000-0145	CVE-2000-0145
CAN-2000-0148	CVE-2000-0148
CAN-2000-0149	CVE-2000-0149
CAN-2000-0150	CVE-2000-0150
CAN-2000-0152	CVE-2000-0152
CAN-2000-0156	CVE-2000-0156
CAN-2000-0161	CVE-2000-0161
CAN-2000-0162	CVE-2000-0162



=================================
Candidate: CAN-1999-0189
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19990607
Category: SF
Reference: NAI:NAI-15
Reference: SUN:00142
Reference: XF:rpc-32771

Solaris rpcbind listens on a high numbered UDP port, which may not be
filtered since the standard port number is 111.

Modifications:
  ADDREF XF:rpc-32771
  ADDREF NAI:NAI-15

INFERRED ACTION: CAN-1999-0189 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:rpc-32771


=================================
Candidate: CAN-1999-0390
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000204-01
Proposed: 19991222
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:19990104 Dosemu/S-Lang Overflow + sploit
Reference: CALDERA:CSSA-1999-006.1
Reference: BID:187

Buffer overflow in Dosemu Slang library in Linux.

Modifications:
  ADDREF CALDERA:CSSA-1999-006.1

INFERRED ACTION: CAN-1999-0390 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-1999-0678
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: CF
Reference: XF:apache-debian-usrdoc
Reference: BUGTRAQ:19990405 An issue with Apache on Debian
Reference: BID:318

A default configuration of Apache on Debian Linux sets the ServerRoot
to /usr/doc, which allows remote users to read documentation files
for the entire server.

Modifications:
  ADDREF BID:318

INFERRED ACTION: CAN-1999-0678 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Christey> This candidate is unconfirmed by the vendor.


=================================
Candidate: CAN-1999-0727
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: OPENBSD:19990608 Packets that should have been handled by IPsec may be transmitted as cleartext
Reference: XF:openbsd-ipsec-cleartext

A kernel leak in the OpenBSD kernel allows IPsec packets to be sent
unencrypted.

Modifications:
  ADDREF OPENBSD:19990608 Packets that should have been handled by IPsec may be transmitted as cleartext
  ADDREF XF:openbsd-ipsec-cleartext

INFERRED ACTION: CAN-1999-0727 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Stracener> Add Ref: OPENBSD:19990608  Packets that should have been handled by
 Stracener> IPsec maybe transmitted as cleartext. PF_KEY SA expirations may leak
 Stracener> kernel resources.
 Frech> XF:openbsd-ipsec-cleartext
 Frech> ADDREF OPENBSD:OpenBSD Security Advisory, August 6, 1999, "Packets that
 Frech> should have been handled by IPsec may be transmitted as cleartexrt" at
 Frech> http://www.openbsd.com/errata25.html#ipsec_in_use


=================================
Candidate: CAN-1999-0733
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990626 VMWare Advisory - buffer overflows
Reference: XF:vmware-bo

Buffer overflow in VMWare 1.0.1 for Linux via a long HOME
environmental variable.

Modifications:
  DELREF XF:linux-vmware-buffer-overflows
  ADDREF XF:vmware-bo

INFERRED ACTION: CAN-1999-0733 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:vmware-bo
 Frech> DELREF XF:linux-vmware-buffer-overflows


=================================
Candidate: CAN-1999-0740
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: BID:594
Reference: XF:linux-telnetd-term
Reference: CALDERA:CSSA-1999:022
Reference: REDHAT:RHSA1999029_01

Remote attackers can cause a denial of service on Linux in.telnetd
telnet daemon through a malformed TERM environmental variable.

INFERRED ACTION: CAN-1999-0740 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-1999-0746
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: CF
Reference: BUGTRAQ:19990814 DOS against SuSE's identd
Reference: SUSE:19990824 Security hole in netcfg
Reference: BID:587
Reference: XF:suse-identd-dos

A default configuration of in.identd in SuSE Linux waits 120 seconds
between requests, allowing a remote attacker to conduct a denial of
service.

Modifications:
  ADDREF SUSE:19990824 Security hole in netcfg

INFERRED ACTION: CAN-1999-0746 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Christey> ADDREF SUSE:19990824 Security hole in netcfg


=================================
Candidate: CAN-1999-0778
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: KSRT:011
Reference: XF:accelx-display-bo

Buffer overflow in Xi Graphics Accelerated-X server allows local
users to gain root access via a long display or query parameter.

Modifications:
  CHANGEREF XF:accelx-bo XF:accelx-display-bo

INFERRED ACTION: CAN-1999-0778 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:accelx-display-bo


=================================
Candidate: CAN-1999-0783
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: FreeBSD:FreeBSD-SA-98:05
Reference: CIAC:I-057
Reference: XF:freebsd-nfs-link-dos

FreeBSD allows local users to conduct a denial of service by creating
a hard link from a device special file to a file on an NFS file
system.

Modifications:
  ADDREF XF:freebsd-nfs-link-dos

INFERRED ACTION: CAN-1999-0783 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:freebsd-nfs-link-dos


=================================
Candidate: CAN-1999-0785
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990511 INN 2.0 and higher. Root compromise potential
Reference: SUSE:19990518 Security hole in INN
Reference: XF:inn-pathrun
Reference: BID:254

The INN inndstart program allows local users to gain root privileges
via the "pathrun" parameter in the inn.conf file.

Modifications:
  ADDREF SUSE:19990518 Security hole in INN
  ADDREF BID:254

INFERRED ACTION: CAN-1999-0785 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Christey> BID:255 and BID:254 have a good explanation for why this is
 Christey> different than CAN-1999-0754
 Christey>
 Christey> ADDREF SUSE:19990518 Security hole in INN
 Christey> Also see http://www.redhat.com/corp/support/errata/inn99_05_22.html


=================================
Candidate: CAN-1999-0786
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990922 LD_PROFILE local root exploit for solaris 2.6
Reference: BID:659

The dynamic linker in Solaris allows a local user to create arbitrary
files via the LD_PROFILE environmental variable and a symlink attack.

INFERRED ACTION: CAN-1999-0786 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-1999-0789
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-02
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990928 Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000
Reference: IBM:ERS-SVA-E01-1999:004.1
Reference: CIAC:J-072
Reference: XF:aix-ftpd-bo
Reference: BID:679

Buffer overflow in AIX ftpd in the libc library.

Modifications:
  CHANGEREF BUGTRAQ [add date]
  ADDREF CIAC:J-072
  CHANGEREF IBM:ERS-SVA-E01-1 IBM:ERS-SVA-E01-1999:004.1
  ADDREF BID:679
  ADDREF XF:aix-ftpd-bo

INFERRED ACTION: CAN-1999-0789 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Stracener> Add Ref: CIAC: J-072
 Prosser> ref should read ERS-SVA-E01-1999:004.1
 Prosser> add reference  BID 679
 Frech> XF:aix-ftpd-bo
 Frech> On BUGTRAQ reference, add 19990927 as date
 Frech> On IBM reference, correctly cite as ERS-SVA-E01-1999:004.1


=================================
Candidate: CAN-1999-0796
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: FREEBSD:SA-98.03
Reference: XF:freebsd-ttcp-spoof

FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing
attacks.

Modifications:
  ADDREF XF:freebsd-ttcp-spoof

INFERRED ACTION: CAN-1999-0796 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:freebsd-ttcp-spoof


=================================
Candidate: CAN-1999-0797
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: ISS:19980629 Distributed DoS attack against NIS/NIS+ based networks.
Reference: CIAC:I-070
Reference: XF:sun-nis-nisplus

NIS finger allows an attacker to conduct a denial of service via a
large number of finger requests, resulting in a large number of NIS
queries.

Modifications:
  ADDREF XF:sun-nis-nisplus
  ADDREF ISS:19980629 Distributed DoS attack against NIS/NIS+ based networks.

INFERRED ACTION: CAN-1999-0797 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:sun-nis-nisplus


=================================
Candidate: CAN-1999-0806
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990510 Solaris2.6,2.7 dtprintinfo exploits
Reference: XF:cde-dtprintinfo

Buffer overflow in Solaris dtprintinfo program.

Modifications:
  ADDREF BUGTRAQ:19990510 Solaris2.6,2.7 dtprintinfo exploits

INFERRED ACTION: CAN-1999-0806 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Stracener> Add Ref: BUGTRAQ:19990510:Solaris2.6,2.7 dtprintinfo exploits
 Christey> This candidate is unconfirmed by the vendor.
 Christey>
 Christey> Posted by UNYUN of Shadow Penguin Security; Darren J
 Christey> Moffat claims it is Sun Bug# 4139394.


=================================
Candidate: CAN-1999-0890
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19990928 Team Asylum: iHTML Merchant Vulnerabilities
Reference: XF:ihtml-merchant-file-access

iHTML Merchant allows remote attackers to obtain sensitive information
or execute commands via a code parsing error.

Modifications:
  ADDREF XF:ihtml-merchant-file-access

INFERRED ACTION: CAN-1999-0890 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> ADDREF XF:ihtml-merchant-file-access


=================================
Candidate: CAN-1999-0893
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19991011 SCO OpenServer 5.0.5 overwrite /etc/shadow
Reference: XF:sco-openserver-userosa-script

userOsa in SCO OpenServer allows local users to corrupt files via a
symlink attack.

Modifications:
  ADDREF XF:sco-openserver-userosa-script

INFERRED ACTION: CAN-1999-0893 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:sco-openserver-userosa-script


=================================
Candidate: CAN-1999-0896
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19991109 RealNetworks RealServer G2 buffer overflow.
Reference: MISC:http://service.real.com/help/faq/servg260.html
Reference: XF:realserver-g2-pw-bo
Reference: BID:767

Buffer overflow in RealNetworks RealServer administration utility
allows remote attackers to execute arbitrary commands via a long
username and password.

Modifications:
  ADDREF XF:realserver-g2-pw-bo
  ADDREF MISC:http://service.real.com/help/faq/servg260.html

INFERRED ACTION: CAN-1999-0896 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> ADDREF XF:realserver-g2-pw-bo
 Christey> This candidate is unconfirmed by the vendor.


=================================
Candidate: CAN-1999-0908
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19990921 solaris DoS
Reference: BID:655
Reference: XF:sun-tcp-mutex-enter-dos

Denial of service in Solaris TCP streams driver via a malicious
connection that causes the server to panic as a result of recursive
calls to mutex_enter.

Modifications:
  ADDREF XF:sun-tcp-mutex-enter-dos

INFERRED ACTION: CAN-1999-0908 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> sun-tcp-mutex-enter-dos


=================================
Candidate: CAN-1999-0916
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 19991222
Assigned: 19991208
Category: CF
Reference: ISS:19990629 Bad Permissions on Passwords Stored by WebTrends Software

WebTrends software stores account names and passwords in a file which
does not have restricted access permissions.

INFERRED ACTION: CAN-1999-0916 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:webtrends-bad-perms


=================================
Candidate: CAN-1999-0920
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19990526 Remote vulnerability in pop2d
Reference: XF:pop2-fold-bo

Buffer overflow in the pop-2d POP daemon in the IMAP package allows
remote attackers to gain privileges via the FOLD command.

Modifications:
  ADDREF XF:pop2-fold-bo

INFERRED ACTION: CAN-1999-0920 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> ADDREF XF:pop2-fold-bo


=================================
Candidate: CAN-1999-0931
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19990930 Security flaw in Mediahouse Statistics Server v4.28 & 5.01
Reference: BID:734
Reference: XF:mediahouse-stats-login-bo

Buffer overflow in Mediahouse Statistics Server allows remote
attackers to execute commands.

Modifications:
  ADDREF XF:mediahouse-stats-login-bo

INFERRED ACTION: CAN-1999-0931 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> ADDREF XF:mediahouse-stats-login-bo


=================================
Candidate: CAN-1999-0964
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991214
Assigned: 19991208
Category: SF
Reference: FREEBSD:FreeBSD-SA-97:01
Reference: XF:freebsd-setlocale-bo

Buffer overflow in FreeBSD setlocale in the libc module.

Modifications:
  ADDREF XF:freebsd-setlocale-bo

INFERRED ACTION: CAN-1999-0964 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:freebsd-setlocale-bo


=================================
Candidate: CAN-1999-0966
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 19991222
Assigned: 19991208
Category: SF
Reference: L0PHT:19970127 Solaris libc - getopt(3)

Buffer overflow in Solaris getopt in libc allows local users to gain
root privileges via a long argv[0].

INFERRED ACTION: CAN-1999-0966 MOREVOTES-3 (0 accept, 0 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-1999-0996
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991221
Category: SF
Reference: EEYE:AD19991215
Reference: BUGTRAQ:19991216 Infoseek Ultraseek Remote Buffer Overflow
Reference: NTBUGTRAQ:19991216 Infoseek Ultraseek Remote Buffer Overflow
Reference: XF:infoseek-ultraseek-bo

Buffer overflow in Infoseek Ultraseek search engine allows remote
attackers to execute commands via a long GET request.

Modifications:
  ADDREF XF:infoseek-ultraseek-bo

INFERRED ACTION: CAN-1999-0996 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:infoseek-ultraseek-bo


=================================
Candidate: CAN-1999-0998
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991221
Category: SF
Reference: CISCO:19991216 Cisco Cache Engine Authentication Vulnerabilities
Reference: BUGTRAQ:19991216 Cisco Security Advisory: Cisco Cache Engine Authentication Vulnerabilities
Reference: XF:cisco-cache-engine-replace

Cisco Cache Engine allows an attacker to replace content in the cache.

Modifications:
  ADDREF XF:cisco-cache-engine-replace

INFERRED ACTION: CAN-1999-0998 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Cole> This vulnerability exists in PPP CHAP authentication.  Also the BID is 693.
 Cole> If I have the right vulnerability.  The description is not that clear.
 Frech> XF:cisco-cache-engine-replace


=================================
Candidate: CAN-1999-1000
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 19991222
Assigned: 19991221
Category: SF
Reference: CISCO:19991216 Cisco Cache Engine Authentication Vulnerabilities
Reference: BUGTRAQ:19991216 Cisco Security Advisory: Cisco Cache Engine Authentication Vulnerabilities
Reference: XF:cisco-cache-engine-performance

The web administration interface for Cisco Cache Engine allows remote
attackers to view performance statistics.

Modifications:
  ADDREF XF:cisco-cache-engine-performance

INFERRED ACTION: CAN-1999-1000 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Frech> XF:cisco-cache-engine-performance


=================================
Candidate: CAN-2000-0003
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991230 UnixWare rtpm exploit + discussion
Reference: BUGTRAQ:20000127 New SCO patches...

Buffer overflow in UnixWare rtpm program allows local users to gain
privileges via a long environmental variable.

Modifications:
  ADDREF BUGTRAQ:20000127 New SCO patches...

INFERRED ACTION: CAN-2000-0003 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Comments:
 Christey> ADDREF BUGTRAQ:20000127 New SCO patches...


=================================
Candidate: CAN-2000-0022
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991221 serious Lotus Domino HTTP denial of service
Reference: BUGTRAQ:19991227 Re: Lotus Domino HTTP denial of service attack

Lotus Domino HTTP server does not properly disable anonymous access
for the cgi-bin directory.

INFERRED ACTION: CAN-2000-0022 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0023
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991221 serious Lotus Domino HTTP denial of service
Reference: BUGTRAQ:19991222 Lotus Notes HTTP cgi-bin vulnerability: possible workaround
Reference: BUGTRAQ:19991227 Re: Lotus Domino HTTP denial of service attack

Buffer overflow in Lotus Domino HTTP server allows remote attackers to
cause a denial of service via a long URL.

INFERRED ACTION: CAN-2000-0023 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0025
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: MS:MS99-058
Reference: MSKB:Q238606

IIS 4.0 and Site Server 3.0 allow remote attackers to read source code
for ASP files if the file is in a virtual directory whose name
includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the
"Virtual Directory Naming" vulnerability.

Modifications:
  ADDREF MSKB:Q238606

INFERRED ACTION: CAN-2000-0025 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Stracener> Add Ref: MSKB:Q238606


=================================
Candidate: CAN-2000-0026
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000120-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991222 UnixWare i2odialogd remote root exploit
Reference: BUGTRAQ:19991223 FYI, SCO Security patches available.

Buffer overflow in UnixWare i2odialogd daemon allows remote attackers
to gain root access via a long username/password authorization
string.

Modifications:
  ADDREF BUGTRAQ:19991223 FYI, SCO Security patches available.

INFERRED ACTION: CAN-2000-0026 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0029
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000120-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991227 UnixWare local pis exploit
Reference: BUGTRAQ:20000113 Info on some security holes reported against SCO Unixware.
Reference: BID:901

UnixWare pis and mkpis commands allow local users to gain privileges
via a symlink attack.

Modifications:
  ADDREF BUGTRAQ:20000113 Info on some security holes reported against SCO Unixware.

INFERRED ACTION: CAN-2000-0029 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0031
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: L0PHT:19991227 initscripts-4.48-1 RedHat Linux 6.1
Reference: REDHAT:RHSA-1999:052-04

The initscripts package in Red Hat Linux allows local users to gain
privileges via a symlink attack.

INFERRED ACTION: CAN-2000-0031 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0036
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: MS:MS99-060
Reference: MSKB:Q249082

Outlook Express 5 for Macintosh downloads attachments to HTML mail
without prompting the user, aka the "HTML Mail Attachment"
vulnerability.

INFERRED ACTION: CAN-2000-0036 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0037
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000207-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991228 majordomo local exploit
Reference: BUGTRAQ:20000113 Info on some security holes reported against SCO Unixware.
Reference: BUGTRAQ:20000124 majordomo 1.94.5 does not fix all vulnerabilities
Reference: BID:903

Majordomo wrapper allows local users to gain privileges by specifying
an alternate configuration file.

Modifications:
  ADDREF BUGTRAQ:20000113 Info on some security holes reported against SCO Unixware.
  ADDREF BUGTRAQ:20000124 majordomo 1.94.5 does not fix all vulnerabilities

INFERRED ACTION: CAN-2000-0037 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0039
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000121-01
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991229 AltaVista
Reference: BUGTRAQ:19991230 Follow UP AltaVista
Reference: BUGTRAQ:19991229 AltaVista followup and monitor script
Reference: BUGTRAQ:20000103 FW: Patch issued for AltaVista Search Engine Directory TraversalVulnerability
Reference: BUGTRAQ:20000109 Altavista followup
Reference: BID:896

AltaVista search engine allows remote attackers to read files above
the document root via a .. (dot dot) in the query.cgi CGI program.

INFERRED ACTION: CAN-2000-0039 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0040
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991223 Multiple vulnerabilites in glFtpD (current versions)

glFtpD allows local users to gain privileges via metacharacters in the
SITE ZIPCHK command.

INFERRED ACTION: CAN-2000-0040 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0041
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000111
Assigned: 20000111
Category: SF
Reference: BUGTRAQ:19991229 The "Mac DoS Attack," a Scheme for Blocking Internet Connections
Reference: BID:890

Macintosh systems generate large ICMP datagrams in response to
malformed datagrams, allowing them to be used as amplifiers in a flood
attack.

INFERRED ACTION: CAN-2000-0041 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0088
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000208
Assigned: 20000202
Category: SF
Reference: MS:MS00-002
Reference: XF:office-malformed-convert
Reference: BID:946

Buffer overflow in the conversion utilities for Japanese, Korean and
Chinese Word 5 documents allows an attacker to execute commands, aka
the "Malformed Conversion Data" vulnerability.

INFERRED ACTION: CAN-2000-0088 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0089
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified: 20000313-01
Proposed: 20000208
Assigned: 20000202
Category: SF
Reference: NTBUGTRAQ:20000121 RDISK registry enumeration file vulnerability in Windows NT 4.0 Terminal Server Edition
Reference: BUGTRAQ:20000122 RDISK registry enumeration file vulnerability in Windows NT 4.0 Terminal Server Edition
Reference: MS:MS00-004
Reference: MSKB:Q249108
Reference: BID:947
Reference: XF:nt-rdisk-enum-file

The rdisk utility in Microsoft Terminal Server Edition and Windows NT
4.0 stores registry hive information in a temporary file with
permissions that allow local users to read it, aka the "RDISK Registry
Enumeration File" vulnerability.

Modifications:
  DESC Add Win NT 4.0

INFERRED ACTION: CAN-2000-0089 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:

Comments:
 Wall> Add Windows NT 4.0 server and workstation as well.  It works on these platforms
 Wall> as well.


=================================
Candidate: CAN-2000-0097
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000208
Assigned: 20000202
Category: SF
Reference: NTBUGTRAQ:20000127 Alert: MS IIS 4 / IS 2 (Cerberus Security Advisory CISADV000126)
Reference: MS:MS00-006
Reference: BID:950
Reference: XF:http-indexserver-dirtrans

The WebHits ISAPI filter in Microsoft Index Server allows remote
attackers to read arbitrary files, aka the "Malformed Hit-Highlighting
Argument" vulnerability.

INFERRED ACTION: CAN-2000-0097 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0098
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000208
Assigned: 20000202
Category: SF
Reference: MS:MS00-006

Microsoft Index Server allows remote attackers to determine the real
path for a web directory via a request to an Internet Data Query file
that does not exist.

INFERRED ACTION: CAN-2000-0098 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0121
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000208
Assigned: 20000208
Category: SF
Reference: NTBUGTRAQ:20000201 "Recycle Bin Creation" Vulnerability in Windows NT / Windows 2000
Reference: MS:MS00-007
Reference: MSKB:Q248399
Reference: BID:963

The Recycle Bin utility in Windows NT and Windows 2000 allows local
users to read or modify files by creating a subdirectory with the
victim's SID in the recycler directory, aka the "Recycle Bin
Creation" vulnerability.

INFERRED ACTION: CAN-2000-0121 MOREVOTES-2 (0 accept, 2 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0139
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: SF
Reference: BUGTRAQ:20000210 remote DoS on Internet Anywhere Mail Server Ver.3.1.3
Reference: BID:982

Internet Anywhere POP3 Mail Server allows local users to cause a
denial of service via a malformed RETR command.

INFERRED ACTION: CAN-2000-0139 MOREVOTES-3 (0 accept, 0 ack, 0 review)

Current Votes:

Comments:
 Christey> This candidate is unconfirmed by the vendor.
 Christey>
 Christey> Reported by Nobuo Miwa, moderator of BUGTRAQ-JP.
 Blake> In his Bugtraq post, Nobuo claims to have discussed it with the vendor and
 Blake> that they said they were working on a fix.  That's good enough for me.


=================================
Candidate: CAN-2000-0145
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: CF
Reference: http://archives.neohapsis.com/archives/bugtraq/2000-02/0038.html
Reference: BUGTRAQ:20000205 Debian (frozen): Perms on /usr/lib/libguile.so.6.0.0

The libguile.so library file used by gnucash in Debian Linux is
installed with world-writable permissions.

INFERRED ACTION: CAN-2000-0145 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0148
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: SF
Reference: http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html
Reference: BUGTRAQ:20000208 Remote access vulnerability in all MySQL server versions
Reference: BUGTRAQ:20000214 MySQL 3.22.32 released
Reference: BID:975

MySQL 3.22 allows remote attackers to bypass password authentication
and access a database via a short check string.

INFERRED ACTION: CAN-2000-0148 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0149
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: SF
Reference: http://archives.neohapsis.com/archives/bugtraq/2000-02/0057.html
Reference: BUGTRAQ:20000209 [SAFER 000209.EXP.1.2] Zeus Web Server - obtaining source of CGI scripts
Reference: BUGTRAQ:20000208 Zeus Web Server: Null Terminated Strings
Reference: BID:977

Zeus web server allows remote attackers to view the source code for
CGI programs via a null character (%00) at the end of a URL.

INFERRED ACTION: CAN-2000-0149 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0150
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: SF
Reference: BUGTRAQ:20000209 FireWall-1 FTP Server Vulnerability
Reference: BUGTRAQ:20000212 Re: FireWall-1 FTP Server Vulnerability
Reference: BUGTRAQ:20000210 Multiple firewalls: FTP Application Level Gateway "PASV" Vulnerability
Reference: BID:979

Firewall-1 allows remote attackers to bypass port access restrictions
on an FTP server by forcing it to send malicious packets which
Firewall-1 misinterprets as a valid 227 response to a client's PASV
attempt.

INFERRED ACTION: CAN-2000-0150 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0152
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000216
Assigned: 20000216
Category: SF
Reference: BUGTRAQ:20000209 Novell BorderManager 3.5 Remote Slow Death
Reference: BUGTRAQ:20000211 BorderManager csatpxy.nlm fix avalable.

Remote attackers can cause a denial of service in Novell BorderManager
3.5 by pressing the enter key in a telnet connection to port 2000.

INFERRED ACTION: CAN-2000-0152 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0156
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000223
Assigned: 20000223
Category: SF
Reference: MS:MS00-009

Internet Explorer 4.x and 5.x allow a remote web server to access
files on the client that are outside of its security domain, aka the
"Image Source Redirect" vulnerability.

INFERRED ACTION: CAN-2000-0156 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0161
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000223
Assigned: 20000223
Category: SF
Reference: MS:MS00-010
Reference: BID:994

Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not
validate an identification number, which allows remote attackers to
execute SQL commands.

INFERRED ACTION: CAN-2000-0161 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:


=================================
Candidate: CAN-2000-0162
Published:
Final-Decision: 20000322
Interim-Decision: 20000315
Modified:
Proposed: 20000223
Assigned: 20000223
Category: SF
Reference: MS:MS00-011

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x
allows a remote attacker to read files via a malicious Java applet
that escapes the Java sandbox, aka the "VM File Reading"
vulnerability.

INFERRED ACTION: CAN-2000-0162 MOREVOTES-2 (0 accept, 1 ack, 0 review)

Current Votes:

Page Last Updated or Reviewed: May 22, 2007