|
|
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> A Bugtraq posting indicates that the bug has to do with "short packets with certain options set," so the description should be modified accordingly. But is this the same as CVE-1999-0052? That one is related to nestea (CVE-1999-0257) and probably the one described in BUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release The patch for nestea is in ip_input.c around line 750. The patches for CVE-1999-0001 are in lines 388&446. So, CVE-1999-0001 is different from CVE-1999-0257 and CVE-1999-0052. The FreeBSD patch for CVE-1999-0052 is in line 750. So, CVE-1999-0257 and CVE-1999-0052 may be the same, though CVE-1999-0052 should be RECAST since this bug affects Linux and other OSes besides FreeBSD.<br> Frech> XF:teardrop(338) This assignment was based solely on references to the CERT advisory.<br> Christey> The description for BID:190, which links to CVE-1999-0052 (a FreeBSD advisory), notes that the patches provided by FreeBSD in CERT:CA-1998-13 suggest a connection between CVE-1999-0001 and CVE-1999-0052. CERT:CA-1998-13 is too vague to be sure without further analysis.<br>
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Status:EntryExecute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Status:EntryMIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
Status:CandidateACCEPT(8) Baker, Cole, Collins, Dik, Landfield, Magdych, Northcutt, Wall<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REVIEWING(1) Shostack<br>Voter Comments:
Frech> Extremely minor, but I believe e-mail is the correct term. (If you reject this suggestion, I will not be devastated.) :-)<br> Christey> This issue seems to have been rediscovered in BUGTRAQ:20000515 Eudora Pro & Outlook Overflow - too long filenames again http://marc.theaimsgroup.com/?l=bugtraq&m=95842482413076&w=2 Also see BUGTRAQ:19990320 Eudora Attachment Buffer Overflow http://marc.theaimsgroup.com/?l=bugtraq&m=92195396912110&w=2<br> Christey> CVE-2000-0415 may be a later rediscovery of this problem for Outlook.<br> Dik> Sun bug 4163471,<br> Christey> ADDREF BID:125<br> Christey> BUGTRAQ:19980730 Long Filenames & Lotus Products URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221104526201&w=2<br>
Arbitrary command execution via IMAP buffer overflow in authenticate command.
Status:EntryBuffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.
Status:EntryInformation from SSL-encrypted sessions via PKCS #1.
Status:EntryBuffer overflow in NIS+, in Sun's rpc.nisd program.
Status:EntryInverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Status:EntryDenial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
Status:EntryDenial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Status:EntrySome web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.
Status:EntryStolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Status:EntryUnauthorized privileged access or denial of service via dtappgather program in CDE.
Status:EntryTeardrop IP denial of service.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF: teardrop-mod<br> Christey> Not sure how many separate "instances" of Teardrop there are. See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258<br> Christey> See the SCO advisory at: http://www.securityfocus.com/templates/advisory.html?id=1411 which may further clarify the issue.<br> Christey> MSKB:Q154174 MSKB:Q154174 (CVE-1999-0015) and MSKB:Q179129 (CVE-1999-0104) indicate that CVE-1999-0015 was fixed in NT SP3, but CVE-1999-0104 was not. Thus CD:SF-LOC suggests that the problems keep separate candidates because one problem appears in a different version than the other.<br> Christey> BID:124 http://www.securityfocus.com/bid/124 Consider MSKB:Q154174 http://support.microsoft.com/support/kb/articles/q154/1/74.asp Consider BUGTRAQ:19971113 Linux IP fragment overlap bug http://www.securityfocus.com/archive/1/8014<br>
Land IP denial of service.
Status:EntryFTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
Status:EntryBuffer overflow in statd allows root privileges.
Status:EntryDelete or create a file via rpc.statd, due to invalid information.
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateMODIFY(1) Frech<br> NOOP(4) Levy, Northcutt, Shostack, Wall<br> REJECT(2) Baker, Christey<br>Voter Comments:
Frech> XF:lpr-bo<br> Christey> DUPE CVE-1999-0032, which includes XF:lpr-bo<br>
Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program.
Status:EntryLocal user gains root privileges via buffer overflow in rdist, via expstr() function.
Status:EntryLocal user gains root privileges via buffer overflow in rdist, via lookup() function.
Status:EntryDNS cache poisoning via BIND, by predictable query IDs.
Status:Entryroot privileges via buffer overflow in df command on SGI IRIX systems.
Status:Entryroot privileges via buffer overflow in pset command on SGI IRIX systems.
Status:Entryroot privileges via buffer overflow in eject command on SGI IRIX systems.
Status:Entryroot privileges via buffer overflow in login/scheme command on SGI IRIX systems.
Status:Entryroot privileges via buffer overflow in ordist command on SGI IRIX systems.
Status:Entryroot privileges via buffer overflow in xlock command on SGI IRIX systems.
Status:CandidateACCEPT(3) Levy, Ozancin, Prosser<br> NOOP(1) Baker<br> RECAST(1) Frech<br> REJECT(1) Christey<br>Voter Comments:
Frech> XF:xlock-bo (also add) As per xlock-bo, also appears on AIX, BSDI, DG/UX, FreeBSD, Solaris, and several Linii. Also, don't you mean to cite SGI:19970502-02-PX? The one you list is login/scheme.<br> Levy> Notice that this xlock overflow is the same as in CA-97.13. CA-97.21 simply is a reminder.<br> Christey> As pointed out by Elias, CA-97.21 states: "For more information about vulnerabilities in xlock... see CA-97.13" CA-97.13 = CVE-1999-0038. This may also be a duplicate with CVE-1999-0306. See exploits at: http://marc.theaimsgroup.com/?l=bugtraq&m=87602167418394&w=2 http://marc.theaimsgroup.com/?l=bugtraq&m=87602167418404&w=2 Sun also has this problem, at http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/150&type=0&nav=sec.sba<br>
JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability.
Status:EntryBuffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Status:EntryCommand execution in Sun systems via buffer overflow in the at program.
Status:CandidateACCEPT(8) Baker, Cole, Collins, Dik, Hill, Northcutt, Shostack, Wall<br> NOOP(1) Christey<br> RECAST(1) Frech<br>Voter Comments:
Frech> This vulnerability also manifests itself for the following platforms: AIX, HPUX, IRIX, Solaris, SCO, NCR MP-RAS. In this light, please add the following: Reference: XF:at-bo<br> Dik> Sun bug 1265200, 4063161<br> Christey> ADDREF SGI:19971102-01-PX ftp://patches.sgi.com/support/free/security/advisories/19971102-01-PX SCO:SB.97:01 ftp://ftp.sco.com/SSE/security_bulletins/SB.97:01a<br> Christey> CIAC:F-15 http://ciac.llnl.gov/ciac/bulletins/f-15.shtml HP:HPSBUX9502-023<br> Christey> Add period to the end of the description.<br>
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Status:EntryRace condition in signal handling routine in ftpd, allowing read/write arbitrary files.
Status:EntryIRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
Status:EntryArbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
Status:EntryBuffer overflow in xlock program allows local users to execute commands as root.
Status:Entrywebdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter.
Status:EntryBuffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Status:EntryBuffer overflow in NLS (Natural Language Service).
Status:EntryBuffer overflow in University of Washington's implementation of IMAP and POP servers.
Status:EntryCommand execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Status:Entryfsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
Status:EntryList of arbitrary files on Web host via nph-test-cgi script.
Status:EntryBuffer overflow of rlogin program using TERM environmental variable.
Status:EntryMIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.
Status:EntryTalkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
Status:EntryCsetup under IRIX allows arbitrary file creation or overwriting.
Status:EntryBuffer overflow in HP-UX newgrp program.
Status:EntryArbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Status:EntryIP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.
Status:EntryTCP RST denial of service in FreeBSD.
Status:EntrySun's ftpd daemon can be subjected to a denial of service.
Status:EntryBuffer overflows in Sun libnsl allow root access.
Status:EntryBuffer overflow in Sun's ping program can give root access to local users.
Status:EntryVacation program allows command execution by remote users through a sendmail command.
Status:EntryBuffer overflow in PHP cgi program, php.cgi allows shell access.
Status:EntryIRIX fam service allows an attacker to obtain a list of all files on the server.
Status:EntryAttackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
Status:EntryFile creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
Status:CandidateACCEPT(3) Frech, Hill, Northcutt<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> This should be split into three separate problems based on the SNI advisory. But there's newer information to further complicate things. What do we do about this one? in 1997 or so, SNI did an advisory on this problem. In early 2000, it was still discovered to be present in some Linux systems. So an SF-DISCOVERY content decision might say that this is a long enough time between the two, so this should be recorded separately. But they're the same codebase... so if we keep them in the same entry, how do we make sure that this entry reflects that some new information has been discovered? The use of dot notation may help in this regard, to use one dot for the original problem as discovered in 1997, and another dot for the resurgence of the problem in 2000.<br> Baker> We should merge these.<br> Christey> Perhaps this should be NAI-19 instead of NAI-20? The original Bugtraq post for the SNI advisory suggests SNI-19: BUGTRAQ:19971002 SNI-19:BSD lpd vulnerability URL:SNI-19:BSD lpd vulnerability Also add: BUGTRAQ:19971021 SNI-19: BSD lpd vulnerabilities (UPDATE) URL:http://marc.theaimsgroup.com/?l=bugtraq&m=87747479514310&w=2 However, archives of "NAI-0020" point to the lpd vuln. If I recall correctly, some of the NAI advisory numbers got switched when NAI acquired SNI.<br>
The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.
Status:EntryCisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.
Status:EntryBuffer overflow in AIX lquerylv program gives root access to local users.
Status:EntryMultiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands.
Status:EntryAnyForm CGI remote execution.
Status:Entryphf CGI program allows remote command execution through shell metacharacters.
Status:EntryCGI PHP mylog script allows an attacker to read any file on the target server.
Status:EntrySolaris ufsrestore buffer overflow.
Status:Entrytest-cgi program allows an attacker to list files on the server.
Status:EntryApache httpd cookie buffer overflow for versions 1.1.1 and earlier.
Status:EntryBuffer overflow in AIX xdat gives root access to local users.
Status:EntryTelnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.
Status:EntryListening TCP ports are sequentially allocated, allowing spoofing attacks.
Status:EntryPASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.
Status:EntryBuffer overflow in wu-ftp from PASV command causes a core dump.
Status:CandidateACCEPT(3) Baker, Frech, Ozancin<br> NOOP(1) Balinsky<br> REVIEWING(1) Christey<br>Voter Comments:
Balinsky> Don't know what this is. Is this the LIST Core dump vulnerability?<br> Christey> Need to add more references and details.<br>
Predictable TCP sequence numbers allow spoofing.
Status:Entrypcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
Status:CandidateACCEPT(5) Collins, Frech, Landfield, Northcutt, Shostack<br> NOOP(1) Baker<br> RECAST(1) Christey<br>Voter Comments:
Christey> This candidate should be SPLIT, since there are two separate software flaws. One is a symlink race and the other is a shell metacharacter problem.<br> Christey> The permissions part of this vulnerability appears to overlap with CVE-1999-0353<br> Christey> SGI:20020802-01-I<br>
Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports.
Status:EntryCertain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command.
Status:Entrywu-ftp allows files to be overwritten via the rnfr command.
Status:EntryCWD ~root command in ftpd allows root access.
Status:Entrygetcwd() file descriptor leak in FTP.
Status:EntryCertain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0.
Status:EntryBuffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname.
Status:EntryAIX routed allows remote users to modify sensitive files.
Status:CandidateACCEPT(2) Northcutt, Shostack<br> MODIFY(2) Frech, Prosser<br> NOOP(1) Baker<br> REJECT(1) Christey<br>Voter Comments:
Frech> Reference: XF:ibm-routed<br> Prosser> This vulnerability allows debug mode to be turned on which is the problem. Should this be more specific in the description? This one also affects SGI OSes, ref SGI Security Advisory 19981004-PX which is in the SGI cluster, shouldn't these be cross-referenced as the same vuln affects multiple OSes.<br> Christey> This appears to be subsumed by CVE-1999-0215<br>
Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
Status:EntryIRIX and AIX automountd services (autofsd) allow remote users to execute root commands.
Status:CandidateACCEPT(2) Northcutt, Shostack<br> MODIFY(2) Frech, Prosser<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> ERS (and other references, BTW) explicitly stipulate 'local and remote'. Reference: XF:irix-autofsd<br> Prosser> Include the SGI Alert as well since it is mentioned in the description. SGI Security Advisory 19981005-01-PX<br> Christey> DUPE CVE-1999-0210?<br> Christey> ADDREF CIAC:J-014<br> Baker> It does look very similar to 1999-0210. Perhaps they should be a single entry<br>
Buffer overflow in AIX libDtSvc library can allow local users to gain root access.
Status:CandidateACCEPT(2) Northcutt, Shostack<br> MODIFY(2) Frech, Prosser<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Reference: XF:ibm-libDtSvc<br> Prosser> The overflow is in the dtaction utility. Also affects dtaction in the CDE on versions of SunOS (SUN 164). Probably should be specific.<br> Christey> Same Codebase as CVE-1999-0121, so the two entries should be merged.<br>
Buffer overflow in AIX rcp command allows local users to obtain root access.
Status:EntryBuffer overflow in AIX writesrv command allows local users to obtain root access.
Status:EntryVarious vulnerabilities in the AIX portmir command allows local users to obtain root access.
Status:CandidateACCEPT(2) Baker, Bollinger<br> MODIFY(1) Frech<br> NOOP(1) Ozancin<br>Voter Comments:
Frech> XF:ibm-portmir<br>
AIX nslookup command allows local users to obtain root access by not dropping privileges correctly.
Status:EntryAIX piodmgrsu command allows local users to gain additional group privileges.
Status:EntryThe debug command in Sendmail is enabled, allowing attackers to execute commands as root.
Status:EntrySendmail decode alias can be used to overwrite sensitive files.
Status:EntryThe AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Status:EntryBuffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities.
Status:CandidateMODIFY(2) Baker, Frech<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> (Accept XF reference.) Our references do not mention hiding activities. This issue can crash the SMTP server or execute arbitrary byte-code. Is there another reference available?<br> Christey> Should this be merged with CVE-1999-0284, which is Sendmail with SMTP HELO?<br> Christey> BUGTRAQ:19980522 about sendmail 8.8.8 HELO hole http://marc.theaimsgroup.com/?l=bugtraq&m=90221101925991&w=2 BUGTRAQ:19980527 about sendmail 8.8.8 HELO hole http://marc.theaimsgroup.com/?l=bugtraq&m=90221101926003&w=2<br> Baker> Apparently this XF reference is not for this issue, but for the other issue. This should be modified to have the Bugtraq references, and remove the XF reference.<br>
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
Status:EntryRemote access in AIX innd 1.5.1, using control messages.
Status:EntryBuffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names.
Status:EntryBuffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.
Status:EntryEcho and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.
Status:EntryA later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.
Status:CandidateACCEPT(2) Frech, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Wall> Another reference is Microsoft Knowledge Base Q179129.<br> Christey> Not sure how many separate "instances" of Teardrop there are. See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258<br> Christey> See the SCO advisory at: http://www.securityfocus.com/templates/advisory.html?id=1411 which may further clarify the issue.<br> Christey> MSKB:Q179129 http://support.microsoft.com/support/kb/articles/q179/1/29.asp<br> Christey> MSKB:Q179129 http://support.microsoft.com/support/kb/articles/q179/1/29.asp Note that the hotfix name is teardrop2, but the keywords included in the KB article specifically name bonk (CVE-1999-0258) and boink. Since teardrop2 was fixed in a slightly different version (at least in a separate patch) than Teardrop, CD:SF-LOC suggests keeping them separate.<br> Christey> Add period to the end of the description.<br>
finger allows recursive searches by using a long string of @ symbols.
Status:CandidateMODIFY(3) Baker, Frech, Shostack<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Shostack> fingerD<br> Frech> XF:finger-bomb<br> Christey> aka redirection or forwarding requests? (but then might overlap CVE-1999-0106)<br> Baker> should change description to indicate the recursive searching can consume enough system resources to cause a DoS.<br>
Finger redirection allows finger bombs.
Status:CandidateACCEPT(1) Northcutt<br> MODIFY(2) Frech, Shostack<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Shostack> fingerd allows redirection This is a larger modification, since there are two applications of the vulnerability, one that I can finger anonymously, and the other that I can finger bomb anonymously.<br> Frech> XF:finger-bomb<br> Christey> need more refs<br> Baker> This should be merged with 1999-0105<br>
Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Northcutt, Shostack, Wall<br> REVIEWING(1) Levy<br> REVOTE(1) Christey<br>Voter Comments:
Wall> - Although this is probably the phf hack.<br> Frech> XF:apache-dos<br> Christey> This sounds like the incident reported in: NTBUGTRAQ:20000810 Apache Distributed Denial of Service<br> Levy> I belive this is the problem where sending lot of HTTP headers to apache resulted on a denial of service. BUGTRAQ: http://www.securityfocus.com/archive/1/10228 BUGTRAQ: http://www.securityfocus.com/archive/1/10516<br>
The printers program in IRIX has a buffer overflow that gives root access to local users.
Status:EntryBuffer overflow in ffbconfig in Solaris 2.5.1.
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315. Notes: All CVE users should reference CVE-1999-0315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateMODIFY(1) Frech<br> NOOP(4) Levy, Northcutt, Shostack, Wall<br> REJECT(3) Baker, Christey, Dik<br>Voter Comments:
Frech> XF:fdformat-bo<br> Christey> Duplicate of CVE-1999-0315<br> Dik> dup<br>
RIP v1 is susceptible to spoofing.
Status:EntryBuffer overflow in AIX dtterm program for the CDE.
Status:EntrySome implementations of rlogin allow root access if given a -froot parameter.
Status:EntryLocal users can execute commands as other users, and read other users' files, through the filter command in the Elm elm-2.4 mail package using a symlink attack.
Status:CandidateACCEPT(7) Armstrong, Bishop, Blake, Cole, Landfield, Shostack, Wall<br> MODIFY(2) Baker, Frech<br> NOOP(3) Christey, Northcutt, Ozancin<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> XF:elm-filter2<br> CHANGE> [Wall changed vote from NOOP to ACCEPT]<br> Landfield> with Frech modifications<br> Baker> ADD REF http://www.cert.org/ftp/cert_bulletins/VB-95:10a.elm Official Advisory<br> Christey> The correct URL is http://www.cert.org/vendor_bulletins/VB-95:10a.elm Need to make sure that this CERT advisory describes the right problem, especially since the CERT advisory is dated December 18, 1995 and the original Bugtraq post was December 26, 1995.<br> Christey> BID:1802 URL:http://www.securityfocus.com/bid/1802 BID:1802 doesn't include the 1999 posting - does Security Focus think that the 1999 post describes a different vulnerability?<br> Christey> XF:elm-filter2 isn't on the X-Force web site. How about XF:elm-filter(402) ? Its references point to the December 26, 1995 BUgtraq post. Also consider CIAC:G-36 and CERT:VB-95:10<br> Frech> DELREF:XF:elm-filter2(711) ADDREF:XF:elm-filter(402)<br>
AIX bugfiler program allows local users to gain root access.
Status:EntryDenial of service when an attacker sends many SYN packets to create multiple connections without ever sending an ACK to complete the connection, aka SYN flood.
Status:EntryAIX passwd allows local users to gain root access.
Status:EntryAIX infod allows local users to gain root access through an X display.
Status:EntryWindows NT 4.0 beta allows users to read and delete shares.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Baker, Northcutt<br> REJECT(1) Wall<br>Voter Comments:
Wall> Reject based on beta copy.<br> Frech> XF:nt-beta(11) Reconsider reject, because this beta was in widespread use.<br>
Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root.
Status:EntryBuffer overflow in dtaction command gives root access.
Status:CandidateACCEPT(2) Dik, Northcutt<br> MODIFY(3) Baker, Frech, Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Reference: XF:dtaction-bo Reference: XF:sun-dtaction<br> Prosser> Buffer overflow also affects /usr/dt/bin/dtaction in libDtSvc.a library in AIX 4.x, but reference for this Sun vulnerability should only reflect the Sun Bulletin or the CIAC I-032 version of the Sun Bulletin<br> Christey> This is the Same Codebase as CVE-1999-0089, so the two entries should be merged.<br> Frech> Replace sun-dtaction(732) with dtaction-bo(879)<br> Baker> Merge with 1999-0089<br>
Buffer overflow in AIX lchangelv gives root access.
Status:EntryRace condition in Linux mailx command allows local users to read user files.
Status:CandidateACCEPT(3) Baker, Frech, Ozancin<br> NOOP(1) Wall<br>Voter Comments:
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
Status:EntryBuffer overflow in SGI IRIX mailx program.
Status:EntrySGI IRIX buffer overflow in xterm and Xaw allows root access.
Status:Entryswinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.
Status:CandidateACCEPT(2) Baker, Prosser<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> (keep current XF: reference, and add) XF:hpux-sqwmodify<br> Christey> Perhaps this should be split, per SF-LOC.<br> Christey> CIAC:H-81 http://ciac.llnl.gov/ciac/bulletins/h-81.shtml HP:HPSBUX9707-064 references CERT:CA-96.27 http://ciac.llnl.gov/ciac/bulletins/h-81.shtml The original AUSCERT advisory says that the programs "create files in an insecure manner" and "Exploit details involving this vulnerability have been made publicly available." which leads one to assume that the following original Bugtraq post provides the details for a standard symlink problem: BUGTRAQ:19961005 swinst,bug http://marc.theaimsgroup.com/?l=bugtraq&m=87602167419941&w=2<br>
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
Status:EntrySendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
Status:EntryLocal users can start Sendmail in daemon mode and gain root privileges.
Status:EntryBuffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
Status:EntryExpreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access.
Status:Entryfm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access.
Status:Entryvold in Solaris 2.x allows local users to gain root access.
Status:Entryadmintool in Solaris allows a local user to write to arbitrary files and gain root access.
Status:EntryKodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access.
Status:EntryThe dip program on many Linux systems allows local users to gain root access via a buffer overflow.
Status:EntryThe suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
Status:EntryBuffer overflow in Solaris x86 mkcookie allows local users to obtain root access.
Status:EntryDenial of service in RAS/PPTP on NT systems.
Status:CandidateACCEPT(1) Hill<br> MODIFY(2) Frech, Meunier<br> NOOP(1) Baker<br> REJECT(1) Christey<br>Voter Comments:
Meunier> Add "pptp invalid packet length in header" to distinguish from other vulnerabilities in RAS/PPTP on NT systems resulting in DOS, that might be discovered in the future.<br> Frech> XF:nt-ras-bo ONLY IF reference is to MS:MS99-016<br> Christey> According to my mappings, this is not the MS:MS99-016 problem referred to by Andre. However, I have yet to dig up a source.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> CHANGE> [Christey changed vote from REVIEWING to REJECT]<br> Christey> This is too general to know which problem is being discussed. More precise candidates should be created.<br> Christey> Consider adding BID:2111<br>
Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet.
Status:EntryThe Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts.
Status:EntryKerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.
Status:EntryDenial of service in Qmail by specifying a large number of recipients with the RCPT command.
Status:CandidateACCEPT(4) Baker, Frech, Hill, Meunier<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> DUPE CVE-1999-0418 and CVE-1999-0250?<br> Christey> Dan Bernstein, author of Qmail, says that this is not a vulnerability in qmail because Unix has built-in resource limits that can restrict the size of a qmail process; other limits can be specified by the administrator. See http://cr.yp.to/qmail/venema.html Significant discussion of this issue took place on the qmail list. The fundamental question appears to be whether application software should set its own limits, or rely on limits set by the parent operating system (in this case, UNIX). Also, some people said that the only problem was that the suggested configuration was not well documented, but this was refuted by others. See the following threads at http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html "Denial of service (qmail-smtpd)" "qmail-dos-2.c, another denial of service" "[PATCH] denial of service" "just another qmail denial-of-service" "the UNIX way" "Time for a reality check" Also see Bugtraq threads on a different vulnerability that is related to this topic: BUGTRAQ:19990903 Web servers / possible DOS Attack / mime header flooding http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html<br> Baker> http://cr.yp.to/qmail/venema.html Berstein rejects this as a vulnerability, claiming this is a slander campaign by Wietse Venema. His page states this is not a qmail problem, rather it is a UNIX problem that many apps can consume all available memory, and that the administrator is responsible to set limits in the OS, rather than expect applications to individually prevent memory exhaustion. CAN 1999-0250 does appear to be a duplicate of this entry, based on the research I have done so far. There were two different bugtraq postings, but the second one references the first, stating that the new exploit uses perl instead of shell scripting to accomplish the same attack/exploit.<br> Baker> http://www.securityfocus.com/archive/1/6970 http://www.securityfocus.com/archive/1/6969 http://cr.yp.to/qmail/venema.html Should probably reject CVE-1999-0250, and add these references to this Candidate.<br> Baker> http://www.securityfocus.com/bid/2237<br> CHANGE> [Baker changed vote from REVIEWING to ACCEPT]<br> Christey> qmail-dos-1.c, as published by Wietse Venema (CVE-1999-0250) in "BUGTRAQ:19970612 Denial of service (qmail-smtpd)", does not use any RCPT commands. Instead, it sends long strings of "X" characters. A followup by "super@UFO.ORG" includes an exploit that claims to do the same thing; however, that exploit does not send long strings of X characters - it sends a large number of RCPT commands. It appears that super@ufo.org followed up to the wrong message. NOTE: the ufo.org domain was purchased by another party in 2003, so the current owner is not associated with any statements by "super@ufo.org" that were made before 2003. qmail-dos-2.c, as published by Wietse Venema (CVE-1999-0144) in "BUGTRAQ:19970612 qmail-dos-2.c, another denial of service attack" sends a large number of RCPT commands. ADDREF BID:2237 ADDREF BUGTRAQ:19970612 qmail-dos-2.c, another denial of service attack ADDREF BUGTRAQ:19970612 Re: Denial of service (qmail-smtpd) Also see a related thread: BUGTRAQ:19990308 SMTP server account probing http://marc.theaimsgroup.com/?l=bugtraq&m=92100018214316&w=2 This also describes a problem with mail servers not being able to handle too many "RCPT TO" requests. A followup message notes that application-level protection is used in Sendmail to prevent this: BUGTRAQ:19990309 Re: SMTP server account probing http://marc.theaimsgroup.com/?l=bugtraq&m=92101584629263&w=2 The person further says, "This attack can easily be prevented with configuration methods."<br>
Sendmail WIZ command enabled, allowing root access.
Status:EntryThe campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file.
Status:EntryThe aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.
Status:EntryThe handler CGI program in IRIX allows arbitrary command execution.
Status:EntryThe wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.
Status:EntryThe Perl fingerd program allows arbitrary command execution from remote users.
Status:EntryThe SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access.
Status:EntryThe DG/UX finger daemon allows remote command execution through shell metacharacters.
Status:EntryWindows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.
Status:EntryIIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL.
Status:CandidateACCEPT(4) Foat, Frech, Stracener, Wall<br> NOOP(3) Baker, Christey, Cole<br>Voter Comments:
Christey> This is the precursor to the problem that is identified in CVE-1999-0253. <br> Christey> CIAC:H-48 URL:http://ciac.llnl.gov/ciac/bulletins/h-48.shtml<br> CHANGE> [Foat changed vote from NOOP to ACCEPT]<br>
The ghostscript command with the -dSAFER option allows remote attackers to execute commands.
Status:Entrywu-ftpd FTP daemon allows any user and password combination.
Status:CandidateACCEPT(2) Northcutt, Shostack<br> NOOP(1) Baker<br> RECAST(1) Frech<br> REVIEWING(2) Christey, Prosser<br>Voter Comments:
Prosser> but so far can find no reference to this one<br> Frech> Our records indicate that this does not necessarly affect just wu-ftp (ie, also affects IIS FTP server).<br> Christey> The references for XF:ftp-pwless are not specific enough, e.g. in terms of version numbers. Perhaps this candidate should be rejected due to insufficient information.<br>
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.
Status:EntryCisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known.
Status:EntryAttackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases.
Status:EntrySome classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections.
Status:EntryIn Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.
Status:EntryThe "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering.
Status:EntryIn older versions of Sendmail, an attacker could use a pipe character to execute root commands.
Status:CandidateACCEPT(2) Frech, Northcutt<br> MODIFY(1) Prosser<br> NOOP(2) Baker, Christey<br> RECAST(1) Shostack<br>Voter Comments:
Shostack> there was a 'To: |' and a 'From: |' attack, which I think are seperate.<br> Prosser> older vulnerability, but one additional reference is- The Ultimate Sendmail Hole List by Markus Hübner @ bau2.uibk.ac.at/matic/buglist.htm '|PROGRAM '<br> Christey> Description needs to be more specific to distinguish between this and CVE-1999-0203, as alluded to by Adam Shostack<br>
A race condition in the Solaris ps command allows an attacker to overwrite critical files.
Status:EntryNFS cache poisoning.
Status:CandidateACCEPT(3) Baker, Frech, Northcutt<br> MODIFY(1) Shostack<br> NOOP(1) Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Shostack> need more data<br> Christey> need more refs<br> Christey> Add period to the end of the description.<br>
NFS allows users to use a "cd .." command to access other directories besides the exported file system.
Status:EntryIn SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system.
Status:EntryThe portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions.
Status:EntryNFS allows attackers to read and write any file on the system by specifying a false UID.
Status:CandidateACCEPT(2) Frech, Northcutt<br> MODIFY(1) Baker<br> REJECT(1) Shostack<br>Voter Comments:
Shostack> this is not a vulnerability but a design feature.<br> Baker> Maybe we should reword it so that it is clear that this was a problem to something like: "A remote attacker could read/write files to the system with root-level permissions on NFS servers that fail to properly check the UID."<br>
Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.
Status:EntryDenial of service in syslog by sending it a large number of superfluous messages.
Status:CandidateACCEPT(2) Frech, Northcutt<br> NOOP(1) Baker<br> REJECT(2) Christey, Shostack<br>Voter Comments:
Shostack> design issue, not a vulnerability. Alternately, add: DOS on server by opening a large number of telnet sessions..<br> Christey> Duplicate of CVE-1999-0566<br>
FormMail CGI program allows remote execution of commands.
Status:EntryFormMail CGI program can be used by web servers other than the host server that the program resides on.
Status:EntryThe view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:EntryThe convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server.
Status:EntryThe Webgais program allows a remote user to execute arbitrary commands.
Status:EntryThe uploader program in the WebSite web server allows a remote attacker to execute arbitrary programs.
Status:EntryBuffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string.
Status:EntryWindows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Status:Entryin.rshd allows users to login with a NULL username and execute commands.
Status:EntryThe wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
Status:EntrySamba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.
Status:EntryLinux implementations of TFTP would allow access to files outside the restricted directory.
Status:EntryWhen compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records.
Status:EntryIn SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution.
Status:EntryIn Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters.
Status:CandidateACCEPT(2) Baker, Dik<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Change XF:snmp-backdoor-access to XF:sol-hidden-commstr Add ISS:Hidden Community String in SNMP Implementation<br> Christey> What is the proper level of abstraction to use here? Should we have a separate entry for each different default community string? See: http://cve.mitre.org/Board_Sponsors/archives/msg00242.html and http://cve.mitre.org/Board_Sponsors/archives/msg00250.html http://cve.mitre.org/Board_Sponsors/archives/msg00251.html Until the associated content decisions have been approved by the Editorial Board, this candidate cannot be accepted for inclusion in CVE.<br> Christey> ADDREF BID:177<br> Christey> ISS:19981102 Hidden community string in SNMP implementation http://xforce.iss.net/alerts/advise11.php Change description to include "hidden"<br> Christey> XF:snmp-backdoor-access is missing.<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateACCEPT(2) Hill, Northcutt<br> RECAST(3) Baker, Frech, Prosser<br> REJECT(1) Dik<br> REVIEWING(1) Christey<br>Voter Comments:
Prosser> The Sun Patches in Ref roll-up fixes for an earlier BO in rdist lookup( )(ref CERT 96.14)as well as the BO in rdist function expstr() (ref CERT 97-23) and various vendor bulletins. However both of these rdist BO's affect many more OSs than just Sun, i.e., BSD/OS 2.1, DEC OSF's, AIX, FreeBSD, SCO, SGI, etc. Believe this falls into the SF-codebase content decision<br> Frech> XF:rdist-bo (error msg formation) XF:rdist-bo2 (execute code) XF:rdist-bo3 (execute user-created code) XF:rdist-sept97 (root from local)<br> Christey> Duplicate of CVE-1999-0022 (SUN:00179 is referenced in CERT:CA-97.23.rdist), but as Mike and Andre noted, there are multiple flaws here, so a RECAST may be necessary.<br> Dik> As currently phrasedm thissa duplicate of CVE-1999-0022<br> Baker> Based on our new philosophy, this should be recast/merged or re-described.<br>
The passwd command in Solaris can be subjected to a denial of service.
Status:EntrySolaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111.
Status:EntrySolaris rpcbind can be exploited to overwrite arbitrary files and gain root access.
Status:EntryIIS newdsn.exe CGI script allows remote users to overwrite files.
Status:EntryBuffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
Status:EntryDenial of service in Ascend and 3com routers, which can be rebooted by sending a zero length TCP option.
Status:CandidateACCEPT(5) Bishop, Cole, Northcutt, Ozancin, Shostack<br> MODIFY(2) Baker, Blake<br> NOOP(4) Armstrong, Frech, Landfield, Wall<br> REVIEWING(2) Christey, Levy<br>Voter Comments:
Frech> possibly XF:ascend-kill I can't find a reference that lists both routers in the same reference.<br> Wall> Comment: There is a reference about the zero length TCP option in BugTraq on Feb 5, 1999 and it mentions Cisco, but not directly Ascend or 3Com. CIAC Advisory I-038 mentions vulnerabilities in Ascend, but does not mention TCP. CIAC Advisory I-052 mentions 3Com vulnerabilities, but not TCP. Too confusing withour better references.<br> Landfield> What are the references for this ? I cannot find a means to check it out.<br> CHANGE> [Frech changed vote from REVIEWING to NOOP]<br> Frech> Cannot reconcile to our database without further references.<br> Blake> I'm with Andre. I only remember and can find reference to the Ascend issue. Do we have a refernce to the 3Coms? If not, that should be removed from the description.<br> Baker> http://xforce.iss.net/static/614.php Misc Defensive Info http://www.securityfocus.com/archive/1/5682 Misc Offensive Info http://www.securityfocus.com/archive/1/5647 Misc Defensive Info http://www.securityfocus.com/archive/1/5640 Misc Defensive Info<br> CHANGE> [Armstrong changed vote from REVIEWING to NOOP]<br>
Denial of service in in.comsat allows attackers to generate messages.
Status:EntryDenial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
Status:CandidateACCEPT(2) Balinsky, Shostack<br> MODIFY(1) Frech<br> NOOP(3) Baker, Northcutt, Wall<br> REVIEWING(2) Christey, Levy<br>Voter Comments:
Frech> XF:rpcbind-spoof<br> Christey> CVE-1999-0195 = CVE-1999-0461 ? If this is approved over CVE-1999-0461, make sure it gets XF:pmap-sset<br>
websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable).
Status:Entryfinger 0@host on some systems may print information on some user accounts.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Shostack<br> REJECT(1) Northcutt<br>Voter Comments:
Shostack> fingerd may respond to 'finger 0@host' with account info<br> Frech> Need more reference to establish this 'exposure'.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:finger-unused-accounts(8378) We're entering it into our database solely to track competition. The only references seem to be product listings: http://hq.mcafeeasap.com/vulnerabilities/vuln_data/1000.asp (1002 Finger 0@host check) http://www.ipnsa.com/ipnsa_vuln.htm?step=1000 (Finger 0@host check) http://cgi.nessus.org/plugins/dump.php3?id=10069 (Finger zero at host feature)<br>
finger .@host on some systems may print information on some user accounts.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Shostack<br> REJECT(1) Northcutt<br>Voter Comments:
Shostack> as above<br> Frech> Need more reference to establish this 'exposure'.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:finger-unused-accounts(8378) We're entering it into our database solely to track competition. The only references seem to be product listings: http://hq.mcafeeasap.com/vulnerabilities/vuln_data/1000.asp (1004 Finger .@target-host check) http://www.ipnsa.com/ipnsa_vuln.htm?step=1000 (Finger .@target-host check ) http://cgi.nessus.org/plugins/dump.php3?id=10072 (Finger dot at host feature)<br>
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
Status:CandidateWindows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Shostack<br> NOOP(2) Northcutt, Wall<br> REJECT(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Shostack> WFTP is not sufficient; is this wu-, ws-, war-, or another?<br> Frech> Other have mentioned this before, but it may be WU-FTP. POSSIBLY XF:ftp-exec; does this have to do with the Site Exec allowing root access without anon FTP or a regular account? POSSIBLY XF:wu-ftpd-exec;same as above conditions, but instead from a non-anon FTP account and gain root privs.<br> Christey> added MSKB reference<br> CHANGE> [Christey changed vote from REVOTE to REJECT]<br> Christey> The MSKB article may have confused things even more. There were reports of problems in a Windows-based FTP server called WFTP (http://www.wftpd.com/) that is not a Microsft FTP server. It's best to just kill this candidate where it stands and start fresh.<br>
A quote cwd command on FTP servers can reveal the full path of the home directory of the "ftp" user.
Status:EntryThe GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
Status:EntryIn Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.
Status:EntrySendmail 8.6.9 allows remote attackers to execute root commands, using ident.
Status:EntryDenial of service in Sendmail 8.6.11 and 8.6.12.
Status:CandidateACCEPT(2) Hill, Northcutt<br> MODIFY(2) Frech, Prosser<br> NOOP(1) Baker<br> REVIEWING(2) Christey, Ozancin<br>Voter Comments:
Frech> XF:sendmail-alias-dos<br> Prosser> additional source Bugtraq "Re: SM 8.6.12" http://www.securityfocus.com<br> Christey> The Bugtraq thread does not provide any proof, including a comment by Eric Allman that he hadn't been provided any details either. See http://www.securityfocus.com/templates/archive.pike?list=1&date=1995-07-8&thread=199507131402.KAA02492@bedbugs.net.ohio-state.edu for the thread.<br> Christey> Change Bugtraq reference date to 19950708.<br>
MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access.
Status:EntryRemote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.
Status:Entryrpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
Status:EntryThe SunView (SunTools) selection_svc facility allows remote users to read files.
Status:EntryAutomount daemon automountd allows local or remote users to gain privileges via shell metacharacters.
Status:EntryExtra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone.
Status:EntrySolaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server.
Status:Entrylibnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.
Status:CandidateACCEPT(6) Blake, Cole, Dik, Hill, Landfield, Ozancin<br> MODIFY(3) Baker, Frech, Levy<br> NOOP(4) Armstrong, Bishop, Meunier, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:sun-libnsl<br> Dik> Sun bug #4305859<br> Baker> http://xforce.iss.net/static/1204.php Misc Defensive Info http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/172&type=0&nav=sec.sba Vendor Info http://www-1.ibm.com/services/continuity/recover1.nsf/advisories/A1050E354364BF498525680F0077E414/$file/ERS-OAR-E01-1998_074_1.txt Vendor Info http://www.securityfocus.com/archive/1/9749 Misc Defensive Info<br> Christey> I don't think this is the bug that everyone thinks it is. This candidate came from CyberCop Scanner 2.4/2.5, which only reports this as a DoS problem. If SUN:00172 is an advisory for this, then it may be a duplicate of CVE-1999-0055. There appears to be overlap with other references as well. HOWEVER, this particular one deals with a DoS in rpcbind - which isn't mentioned in the sources for CVE-1999-0055.<br> Levy> BID 148<br>
Denial of service by sending forged ICMP unreachable packets.
Status:EntryRouted allows attackers to append data to files.
Status:EntryDenial of service of inetd on Linux through SYN and RST packets.
Status:CandidateACCEPT(1) Hill<br> MODIFY(2) Baker, Frech<br> RECAST(1) Meunier<br>Voter Comments:
Meunier> The location of the vulnerability, whether in the Linux kernel or the application, is debatable. Any program making the same (reasonnable) assumption is vulnerable, i.e., implements the same vulnerability: "Assumption that TCP-three-way handshake is complete after calling Linux kernel function accept(), which returns socket after getting SYN. Result is process death by SIGPIPE" Moreover, whether it results in DOS (to third parties) depends on the process that made the assumption. I think that the present entry should be split, one entry for every application that implements the vulnerability (really describing threat instances, which is what other people think about when we talk about vulnerabilities), and one entry for the Linux kernel that allows the vulnerability to happen.<br> Frech> XF:hp-inetd XF:linux-inetd-dos<br> Baker> Since we have an hpux bulletin, the description should not specifically say Linux, should it? It applies to mulitple OS and should be likely either modified, or in extreme case, recast<br>
Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems.
Status:EntryLivingston portmaster machines could be rebooted via a series of commands.
Status:EntryBuffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command.
Status:EntryAttackers can do a denial of service of IRC by crashing the server.
Status:CandidateNOOP(2) Baker, Northcutt<br> REJECT(2) Christey, Frech<br>Voter Comments:
Frech> Would reconsider if any references were available.<br> Christey> No references available, combined with extremely vague description, equals REJECT.<br>
Denial of service of Ascend routers through port 150 (remote administration).
Status:EntryDenial of service in Cisco IOS web server allows attackers to reboot the router using a long URL.
Status:CandidateACCEPT(1) Baker<br> MODIFY(3) Frech, Levy, Shostack<br> NOOP(3) Balinsky, Northcutt, Wall<br> RECAST(1) Ziese<br> REJECT(1) Christey<br>Voter Comments:
Shostack> I follow cisco announcements and problems pretty closely, and haven't seen this. Source?<br> Frech> XF:cisco-web-crash<br> Christey> XF:cisco-web-crash has no additional references. I can't find any references in Bugtraq or Cisco either. This bug is supposedly tested by at least one security product, but that product's database doesn't have any references either. So a question becomes, how did it make it into at least two security companies' databases?<br> Levy> BUGTGRAQ: http://www.securityfocus.com/archive/1/60159 BID 1154<br> Ziese> The vulnerability is addressed by a vendor acknowledgement. This one, if recast to reflect that "...after using a long url..." should be replaced with "...A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled, browsing to "http://router-ip/anytext?/" is attempted, and the enable password is supplied when requested. This defect can be exploited to produce a denial of service (DoS) attack." Then I can accept this and mark it as "Verfied by my Company". If it can't be recast because this (long uri) is diffferent then our release (special url construction).<br> CHANGE> [Christey changed vote from REVIEWING to REJECT]<br> Christey> Elias Levy's suggested reference is CVE-2000-0380. I don't think that Kevin's description is really addressing this either. The lack of references and a specific description make this candidate unusable, so it should be rejected.<br>
Solaris syslogd crashes when receiving a message from a host that doesn't have an inverse DNS entry.
Status:EntryDenial of service in Windows NT messenger service through a long username.
Status:EntryWindows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size.
Status:EntryWindows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
Status:CandidateACCEPT(1) Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Christey<br>Voter Comments:
Christey> Too general, and no references.<br> Frech> XF:nt-frag(528) See reference from BugTraq Mailing List, "A New Fragmentation Attack" at http://www.securityfocus.com/templates/archive.pike?list=1&date=1997-07-8&ms g=Pine.SUN.3.94.970710054440.11707A-100000@dfw.dfw.net<br>
Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service.
Status:EntryDenial of service in RPCSS.EXE program (RPC Locator) in Windows NT.
Status:EntryDenial of service in Windows NT IIS server using ..\..
Status:CandidateACCEPT(2) Baker, Shostack<br> MODIFY(2) Frech, Wall<br> NOOP(1) Northcutt<br> REJECT(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Wall> Denial of service in Windows NT IIS Server 1.0 using ..\... Source: Microsoft Knowledge Base Article Q115052 - IIS Server.<br> Frech> XF:http-dotdot (not necessarily IIS?)<br> Christey> DELREF XF:http-dotdot - it deals with a read/access dot dot problem.<br> Christey> This actually looks like XF:iis-dot-dot-crash(1638) http://xforce.iss.net/static/1638.php If so, include the version number (2.0) <br> CHANGE> [Christey changed vote from REVOTE to REJECT]<br> Christey> Bill Wall intended to suggest Q155052, but the affected IIS version there is 1.0; the effect is to read files, so this sounds like a directory traversal problem, instead of an inability to process certain strings. As a result, this candidate is too general, since it could apply to 2 different problems, so it should be REJECTed.<br> Christey> Consider adding BID:2218<br>
Buffer overflow in Cisco 7xx routers through the telnet service.
Status:EntryBuffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access.
Status:CandidateACCEPT(2) Baker, Levy<br> NOOP(3) Christey, Landfield, Northcutt<br> RECAST(1) Frech<br> REVIEWING(1) Ozancin<br>Voter Comments:
Frech> XF:slmail-vrfyexpn-overflow (for Slmail v3.2 and below) XF:smtp-vrfy-bo (many mail packages)<br> Northcutt> (There is no way I will have access to these systems)<br> Christey> Some sources report that VRFY and EXPN are both affected.<br>
Buffer overflow in NCSA WebServer (version 1.5c) gives remote access.
Status:CandidateACCEPT(2) Hill, Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Prosser<br> REJECT(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Unable to provide a match due to vague/insufficient description/references. Possible matches are: XF:ftp-ncsa (probably not, considering you've mentioned the webserver.) XF:http-ncsa-longurl (highest probability)<br> Christey> CVE-1999-0235 is the one associated with XF:http-ncsa-longurl More research is necessary for this one.<br> Baker> Since this has no references at all, and is vague and we have a CAN for the most likely issue, we should kill this one<br>
IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files.
Status:EntryBash treats any character with a value of 255 as a command separator.
Status:EntryBuffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.
Status:CandidateACCEPT(3) Hill, Northcutt, Prosser<br> MODIFY(1) Frech<br> REJECT(2) Baker, Christey<br>Voter Comments:
Frech> XF:http-ncsa-longurl<br> Christey> CVE-1999-0235 has the same ref's as CVE-1999-0267<br> Baker> Not to mention, the X-force listings of http-ncsa-longurl and http-port both refer to the same problem. This should be rejected as 1999-0267 is the same problem.<br>
ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs.
Status:EntryRemote execution of arbitrary commands through Guestbook CGI program.
Status:Entryphp.cgi allows attackers to read any file on the system.
Status:CandidateACCEPT(5) Baker, Collins, Frech, Northcutt, Prosser<br> NOOP(1) Christey<br>Voter Comments:
Prosser> additional source AUSCERT External Security Bulletin ESB-97.047 http://www.auscert.org.au<br> Christey> ADDREF BUGTRAQ:19970416 Update on PHP/FI hole URL:http://www.dataguard.no/bugtraq/1997_2/0069.html The attacker specifies the filename as an argument to the program. Add "PHP/FI" to description to facilitate search. AUSCERT URL is ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-97.047<br> Christey> Consider adding BID:2250<br>
Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET.
Status:EntrySome filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy.
Status:CandidateACCEPT(1) Northcutt<br> NOOP(1) Baker<br> REJECT(1) Frech<br>Voter Comments:
Frech> Would reconsider if any references were available.<br>
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.
Status:CandidateACCEPT(3) Hill, Northcutt, Proctor<br> MODIFY(2) Frech, Prosser<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Also add to references: XF:sol-mkcookie<br> Prosser> additional source Bugtraq "X11 cookie hijacker" http://www.securityfocus.com<br> Christey> The cookie hijacker thread has to do with stealing cookies through a file with bad permissions. I'm not sure the X-Force reference identifies this problem either.<br> Christey> CIAC:G-04 URL:http://ciac.llnl.gov/ciac/bulletins/g-04.shtml SGI:19960601-01-I URL:ftp://patches.sgi.com/support/free/security/advisories/19960601-01-I CERT:VB-95:08<br>
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(4) Christey, Northcutt, Shostack, Wall<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> Ambiguous description: need more detail. Possibly: XF:linux-pop3d (mktemp() leads to reading e-mail)<br> Christey> At first glance this might look like CVE-1999-0123 or CVE-1999-0125, however this particular candidate arises out of a brief mention of the problem in a larger posting which discusses CVE-1999-0123 (which may be the same bug as CVE-1999-0125). See the following phrase in the Bugtraq post: "one such example of this is in.pop3d" However, the original source of this candidate's description explicitly mentions shadowed passwords, though it has no references to help out here.<br>
Linux cfingerd could be exploited to gain root access.
Status:CandidateACCEPT(1) Shostack<br> NOOP(4) Baker, Levy, Northcutt, Wall<br> REJECT(2) Christey, Frech<br>Voter Comments:
Christey> This has no sources; neither does the original database that this entry came from. It's a likely duplicate of CVE-1999-0813.<br> Frech> I disagree on the dupe; see Linux-Security Mailing List, "[linux-security] Cfinger (Yet more :)" at http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/. Seems as if v1.2.3 is vulnerable, perhaps 1.3.0 also. CVE-1999-0813 pertains to 1.4.x and below and shows up two years later.<br> CHANGE> [Frech changed vote from REVIEWING to REJECT]<br> Frech> If the reference I previously supplied is correct, then it appears as if the poster modified the source using authorized access to make it vulnerable. Modifying the source in this manner does not qualify as being listed a vulnerability. I disagree on the dupe; see Linux-Security Mailing List, "[linux-security] Cfinger (Yet more :)" at http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/. Seems as if v1.2.3 is vulnerable, perhaps 1.3.0 also. CVE-1999-0813 pertains to 1.4.x and below and shows up two years later.<br>
Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root.
Status:EntrySome configurations of NIS+ in Linux allowed attackers to log in as the user "+".
Status:EntryHP Remote Watch allows a remote user to gain root access.
Status:CandidateACCEPT(4) Frech, Hill, Northcutt, Prosser<br> NOOP(1) Baker<br> RECAST(1) Christey<br>Voter Comments:
Frech> Comment: Determine if it's RemoteWatch or Remote Watch.<br> Christey> HP:HPSBUX9610-039 alludes to multiple vulnerabilities in Remote Watch (the advisory uses two words, not one, for the "Remote Watch" name) ADDREF BUGTRAQ:19961015 HP/UX Remote Watch (was Re: BoS: SOD remote exploit) URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=199610151351.JAA18241@grymoire.crd.ge.com<br> Prosser> agree that the advisory mentions two vulnerabilities in Remote Watch, one being a socket connection and other with the showdisk utility which seems to be a suid vulnerability. Never get much details on this anywhere since the recommendation is to remove the program since it is obsolete and superceded by later tools. Believe the biggest concern here is to just not run the tool at all.<br> Christey> CIAC:H-16 Also, http://www.cert.org/vendor_bulletins/VB-96.20.hp And possibly AUSCERT:AA-96.07 at ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.07.HP-UX.Remote.Watch.vul<br> Christey> Also BUGTRAQ:19961013 BoS: SOD remote exploit http://marc.theaimsgroup.com/?l=bugtraq&m=87602167419969&w=2 Include "remwatch" in the description to facilitate search.<br>
Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.
Status:EntryA race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.
Status:EntryWindows NT RSHSVC program allows remote users to execute arbitrary commands.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Wall<br> NOOP(2) Northcutt, Shostack<br> RECAST(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Wall> Windows NT Rshsvc.exe from the Windows NT Resource Kit allows remote users to execute arbitrary commands. Source: rshsvc.txt from the Windows NT Resource Kit.<br> Frech> XF:rsh-svc<br> Christey> MSKB:Q158320, last reviewed in January 1999, refers to a case where remote users coming from authorized machines are allowed access regardless of what .rhosts says. XF:rsh-svc refers to a bug circa 1997 where any remote entity could execute commands as system.<br>
Denial of service in Qmail through long SMTP commands.
Status:CandidateACCEPT(2) Hill, Meunier<br> MODIFY(1) Frech<br> REJECT(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:qmail-rcpt<br> Christey> DUPE CVE-1999-0418 and CVE-1999-0144?<br> Christey> Dan Bernstein, author of Qmail, says that this is not a vulnerability in qmail because Unix has built-in resource limits that can restrict the size of a qmail process; other limits can be specified by the administrator. See http://cr.yp.to/qmail/venema.html Significant discussion of this issue took place on the qmail list. The fundamental question appears to be whether application software should set its own limits, or rely on limits set by the parent operating system (in this case, UNIX). Also, some people said that the only problem was that the suggested configuration was not well documented, but this was refuted by others. See the following threads at http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html "Denial of service (qmail-smtpd)" "qmail-dos-2.c, another denial of service" "[PATCH] denial of service" "just another qmail denial-of-service" "the UNIX way" "Time for a reality check" Also see Bugtraq threads on a different vulnerability that is related to this topic: BUGTRAQ:19990903 Web servers / possible DOS Attack / mime header flooding http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html<br> Baker> This appears to be the same vulnerability listed in CAN 1999-0144. In reading through both bugtraq postings, the one that is referenced by 0144 is based on a shell code exploit to cause memory exhaustion. The bugtraq posting referenced by this entry refers explicitly to the prior posting for 0144, and states that the same effect could be accomplished by a perl exploit, which was then attached.<br> Baker> http://www.securityfocus.com/archive/1/6969 CVE-1999-0144 http://www.securityfocus.com/archive/1/6970 CVE-1999-0250 Both references should be added to CVE-1999-0144, and CVE-1999-0250 should likely be rejected.<br> CHANGE> [Baker changed vote from REVIEWING to REJECT]<br> Christey> XF:qmail-leng no longer exists; check with Andre to see if they regarded it as a duplicate as well. qmail-dos-1.c, as published by Wietse Venema (CVE-1999-0250) in "BUGTRAQ:19970612 Denial of service (qmail-smtpd)", does not use any RCPT commands. Instead, it sends long strings of "X" characters. A followup by "super@UFO.ORG" includes an exploit that claims to do the same thing; however, that exploit does not send long strings of X characters - it sends a large number of RCPT commands. It appears that super@ufo.org followed up to the wrong message. qmail-dos-2.c, as published by Wietse Venema (CVE-1999-0144) in "BUGTRAQ:19970612 qmail-dos-2.c, another denial of service attack" sends a large number of RCPT commands. ADDREF BUGTRAQ:19970612 Denial of service (qmail-smtpd) ADDREF BUGTRAQ:19970612 qmail-dos-2.c, another denial of service attack Also see a related thread: BUGTRAQ:19990308 SMTP server account probing http://marc.theaimsgroup.com/?l=bugtraq&m=92100018214316&w=2 This also describes a problem with mail servers not being able to handle too many "RCPT TO" requests. A followup message notes that application-level protection is used in Sendmail to prevent this: BUGTRAQ:19990309 Re: SMTP server account probing http://marc.theaimsgroup.com/?l=bugtraq&m=92101584629263&w=2 The person further says, "This attack can easily be prevented with configuration methods."<br>
Denial of service in talk program allows remote attackers to disrupt a user's display.
Status:EntryBuffer overflow in listserv allows arbitrary command execution.
Status:EntryIIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL.
Status:CandidateACCEPT(9) Armstrong, Baker, Bishop, Blake, Cole, Collins, Frech, Landfield, Northcutt<br> MODIFY(1) LeBlanc<br> NOOP(3) Ozancin, Prosser, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> This is a problem that was introduced after patching a previous dot bug with the iis-fix hotfix (see CVE-1999-0154). Since the hotfix introduced the problem, this should be treated as a seaprate issue.<br> Wall> Agree with the comment.<br> LeBlanc> - this one is so old, I don't remember it at all and can't verify or deny the issue. If you can find some documentation that says we fixed it (KB article, hotfix, something), then I would change this to ACCEPT<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> BID:1814 URL:http://www.securityfocus.com/bid/1814<br>
A hidden SNMP community string in HP OpenView allows remote attackers to modify MIB tables and obtain sensitive information.
Status:CandidateACCEPT(2) Baker, Frech<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> What is the proper level of abstraction to use here? Should we have a separate entry for each different default community string? See: http://cve.mitre.org/Board_Sponsors/archives/msg00242.html and http://cve.mitre.org/Board_Sponsors/archives/msg00250.html http://cve.mitre.org/Board_Sponsors/archives/msg00251.html Until the associated content decisions have been approved by the Editorial Board, this candidate cannot be accepted for inclusion in CVE.<br>
Buffer overflow in ircd allows arbitrary command execution.
Status:CandidateACCEPT(3) Baker, Hill, Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Prosser<br> REJECT(1) Christey<br>Voter Comments:
Frech> XF:irc-bo<br> Christey> This is too general and doesn't have any references. The XF reference doesn't appear toe xist any more. Perhaps this reference would help: BUGTRAQ:19970701 ircd buffer overflow<br> Baker> It appears that the XForce entry has been corrected, and there is a patch posted in the original bugtraq post.<br>
Buffer overflow in War FTP allows remote execution of commands.
Status:EntryNestea variation of teardrop IP fragmentation denial of service.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:nestea-linux-dos<br> Christey> Not sure how many separate "instances" of Teardrop and its ilk. Also see comments on CVE-1999-0001. See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258 Is CVE-1999-0001 the same as CVE-1999-0052? That one is related to nestea (CVE-1999-0257) and probably the one described in BUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release The patch for nestea is in ip_input.c around line 750. The patches for CVE-1999-0001 are in lines 388&446. So, CVE-1999-0001 is different from CVE-1999-0257 and CVE-1999-0052. The FreeBSD patch for CVE-1999-0052 is in line 750. So, CVE-1999-0257 and CVE-1999-0052 may be the same, though CVE-1999-0052 should be RECAST since this bug affects Linux and other OSes besides FreeBSD. Also see BUGTRAQ:19990909 CISCO and nestea. Finally, note that there is no fundamental difference between nestea and nestea2/nestea-v2; they are different ports that exploit the same problem. The original nestea advisory is at http://www.technotronic.com/rhino9/advisories/06.htm but notice that the suggested fix is in line 375 of ip_fragment.c, not ip_input.c.<br> Christey> See the SCO advisory at: http://www.securityfocus.com/templates/advisory.html?id=1411 which may further clarify the issue.<br> Christey> BUGTRAQ:19980501 nestea does other things http://marc.theaimsgroup.com/?l=bugtraq&m=90221101925819&w=2 BUGTRAQ:19980508 nestea2 and HP Jet Direct cards. URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221101925870&w=2 BUGTRAQ:19981027 nestea v2 against freebsd 3.0-Release URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90951521507669&w=2 Nestea source code is in MISC:http://oliver.efri.hr/~crv/security/bugs/Linux/ipfrag6.html<br>
Bonk variation of teardrop IP fragmentation denial of service.
Status:CandidateMODIFY(2) Frech, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Wall> Reference Q179129<br> Frech> XF:teardrop-mod<br> Christey> Not sure how many separate "instances" of Teardrop there are. See: CVE-1999-0015, CVE-1999-0104, CVE-1999-0257, CVE-1999-0258<br> Christey> See the SCO advisory at: http://www.securityfocus.com/templates/advisory.html?id=1411 which may further clarify the issue.<br> Christey> BUGTRAQ:19980108 bonk.c URL:http://marc.theaimsgroup.com/?l=bugtraq&m=88429524325956&w=2 NTBUGTRAQ:19980108 bonk.c URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88433857200304&w=2 NTBUGTRAQ:19980109 Re: Bonk.c URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88441302913269&w=2 NTBUGTRAQ:19980304 Update on wide-spread NewTear Denial of Service attacks URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=88901842000424&w=2 BUGTRAQ:19980304 Update on wide-spread NewTear Denial of Service attacks URL:http://marc.theaimsgroup.com/?l=bugtraq&m=88903296104349&w=2 CIAC:I-031a http://ciac.llnl.gov/ciac/bulletins/i-031a.shtml CERT summary CS-98.02 implies that bonk, boink, and newtear all exploit the same vulnerability.<br>
cfingerd lists all users on a system via search.**@target.
Status:EntryThe jj CGI program allows command execution via shell metacharacters.
Status:EntryNetmanager Chameleon SMTPd has several buffer overflows that cause a crash.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Landfield<br> NOOP(3) Christey, Northcutt, Ozancin<br>Voter Comments:
Frech> XF:chamelion-smtp-dos<br> Landfield> - Specify what "a crash" means.<br> Christey> ADDREF XF:chameleon-smtp-dos ? (but it's not on the web site)<br> Christey> Consider adding BID:2387<br>
Hylafax faxsurvey CGI script on Linux allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.
Status:EntrySolaris SUNWadmap can be exploited to obtain root access.
Status:Entryhtmlscript CGI program allows remote read access to files.
Status:EntryICMP redirect messages may crash or lock up a host.
Status:EntryThe info2www CGI script allows remote file access or remote command execution.
Status:EntryBuffer overflow in NCSA HTTP daemon v1.3 allows remote command execution.
Status:EntryMetaInfo MetaWeb web server allows users to upload, execute, and read scripts.
Status:EntryNetscape Enterprise servers may list files through the PageServices query.
Status:EntryDirectory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files.
Status:EntryProgressive Networks Real Video server (pnserver) can be crashed remotely.
Status:CandidateACCEPT(3) Baker, Blake, Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Problem confirmed by RealServer vendor (URL listed in Bugtraq posting), but may be multiple codebases since several Real Audio servers are affected. Also, this may be the same as BUGTRAQ:19991105 RealNetworks RealServer G2 buffer overflow. See CVE-1999-0896<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> ADDREF XF:realvideo-telnet-dos<br>
Denial of service in Slmail v2.5 through the POP3 port.
Status:EntryDenial of service through Solaris 2.5.1 telnet by sending ^D characters.
Status:EntryDenial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.
Status:EntryDenial of service in Windows NT DNS servers by flooding port 53 with too many characters.
Status:EntrymSQL v2.0.1 and below allows remote execution through a buffer overflow.
Status:EntryThe WorkMan program can be used to overwrite any file to get root access.
Status:EntryIn IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
Status:EntryExcite for Web Servers (EWS) allows remote command execution via shell metacharacters.
Status:EntryRemote command execution in Microsoft Internet Explorer using .lnk and .url files.
Status:EntryDenial of service in IIS using long URLs.
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1584, CVE-1999-1586. Reason: This candidate combined references from one issue with the description from another issue. Notes: Users should consult CVE-1999-1584 and CVE-1999-1586 to obtain the appropriate name. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateACCEPT(2) Baker, Dik<br> MODIFY(1) Frech<br> NOOP(1) Ozancin<br> RECAST(1) Prosser<br> REJECT(1) Christey<br>Voter Comments:
Frech> XF:sun-loadmodule XF:sun-modload (CERT CA-93.18 very old!)<br> Prosser> Believe the reference given, 95-12, is referencing a later loadmodule(8) setuid problem in the X11/NeWS windowing system. There is an earlier, similar setuid vulnerability in the CA-93.18, CIAC G-02 advisories for the SunOS 4.1.x/Solbourne and OpenWindow 3.0. In fact, there may be the same as the HP patches are 100448-02 for the 93 loadmodule/modload vulnerability and 100448-03 for the 95 loadmodule vulnerability which normally indicated a patch update. Looks like the original patch either didn't completely fix the problem or it resurfaced in X11 NeWS. Can't tell much beyond that and this is my opinion only as have no way to check it. Which one is this CVE referencing? I accept both.<br> Dik> There are three similar Sun bug ids associated with the patches. 1076118 loadmodule has a security vulnerability 1148753 loadmodule has a security vulnerability 1222192 loadmodule has a security vulnerability as well as: 1137491 Ancient stuff.<br> Christey> Add period to the end of the description.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> This is distinct from CVE-1999-1584 - CVE-1999-1584 is for CA-93.18.<br> CHANGE> [Christey changed vote from REVIEWING to REJECT]<br> Christey> This candidate combines two separate issues. It uses the CERT alert reference from 1995, from one issue, but a description that is associated with a separate issue.<br>
The Java Web Server would allow remote users to obtain the source code for CGI programs.
Status:CandidateACCEPT(7) Baker, Blake, Cole, Collins, Dik, Northcutt, Wall<br> MODIFY(1) Frech<br> NOOP(5) Armstrong, Bishop, Christey, Landfield, Prosser<br> REVIEWING(1) Ozancin<br>Voter Comments:
Wall> Acknowledged by vendor at http://www.sun.com/software/jwebserver/techinfo/jws112info.html.<br> Baker> Vulnerability Reference (HTML) Reference Type http://www.securityfocus.com/archive/1/7260 Misc Defensive Info http://www.sun.com/software/jwebserver/techinfo/jws112info.html Vendor Info<br> Christey> BID:1891 URL:http://www.securityfocus.com/bid/1891<br> Christey> Add version number (1.1 beta) and details of attack (appending a . or a \) The Sun URL referenced by Dave Baker no longer exists, so I wasn't able to verify that it addressed the problem described in the Bugtraq post. This might not even be Sun's "Java Web Server," as CVE-2001-0186 describes some product called "Free Java Web Server"<br> Dik> There appears to be some confusion. The particular bug seems to be on in JWS 1.1beta or 1.1 which was fixed in 1.1.2 (get foo.jthml source by appending "." of "\" to URL) There are other bugs that give access and that require a configuration change. http://www.sun.com/software/jwebserver/techinfo/security_advisory.html<br> Christey> Need to make sure to create CAN's for the other bugs, as documented in: NTBUGTRAQ:19980724 Alert: New Source Bug Affect Sun JWS http://marc.theaimsgroup.com/?l=ntbugtraq&m=90222454131622&w=2 BUGTRAQ:19980725 Alert: New Source Bug Affect Sun JWS http://marc.theaimsgroup.com/?l=bugtraq&m=90221104526086&w=2 The reported bugs are: 1) file read by appending %20 2) Directly call /servlet/file URL:http://www.sddt.com/cgi-bin/Subscriber?/library/98/07/24/tbd.html #2 is explicitly mentioned in the Sun advisory for CVE-1999-0283.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:javawebserver-cgi-source(5383)<br>
Denial of service to NT mail servers including Ipswitch, Mdaemon, and Exchange through a buffer overflow in the SMTP HELO command.
Status:CandidateACCEPT(2) Blake, Northcutt<br> MODIFY(3) Frech, Levy, Ozancin<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> "Windows NT-based mail servers" (A trademark thing, and for clarification) XF:mdaemon-helo-bo XF:lotus-notes-helo-crash XF:slmail-helo-overflow XF:smtp-helo-bo (mentions several products) XF:smtp-exchangedos<br> Levy> - Need one per software. Each one should be its own vulnerability.<br> Ozancin> => Windows NT is correct<br> Christey> These are probably multiple codebases, so we'll need to use dot notation. Also need to see if this should be merged with CVE-1999-0098 (Sendmail SMTP HELO).<br>
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.
Status:CandidateACCEPT(1) Hill<br> NOOP(2) Baker, Wall<br> REJECT(2) Christey, Frech<br>Voter Comments:
Christey> No references, no information.<br> CHANGE> [Frech changed vote from REVIEWING to REJECT]<br> Frech> No references; closest documented match is with CVE-2001-0346, but that's for Windows 2000.<br>
In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages.
Status:CandidateACCEPT(3) Armstrong, Cole, Shostack<br> MODIFY(3) Blake, Levy, Wall<br> NOOP(5) Baker, Bishop, Landfield, Northcutt, Ozancin<br> REJECT(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Wall> In some NT web servers, appending a dot at the end of a URL may allows attackers to read source code for active pages. Source: MS Knowledge Base Article Q163485 - "Active Server Pages Script Appears in Browser"<br> Frech> In the meantime, reword description as 'Windows NT' (trademark issue)<br> Christey> Q163485 does not refer to a space, it refers to a dot. However, I don't have other references. Reading source code with a dot appended is in CVE-1999-0154, which will be proposed. A subsequent bug similar to the dot bug is CVE-1999-0253.<br> Levy> NTBUGTRAQ: http://www.securityfocus.com/archive/2/22014 NTBUGTRAQ: http://www.securityfocus.com/archive/2/22019 BID 273<br> Blake> Reference: http://www.allaire.com/handlers/index.cfm?ID=10967<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> CHANGE> [Frech changed vote from REVIEWING to REJECT]<br> Frech> BID articles)<br>
Vulnerability in the Wguest CGI program.
Status:CandidateMODIFY(2) Frech, Shostack<br> NOOP(4) Blake, Levy, Northcutt, Wall<br> REJECT(2) Baker, Christey<br>Voter Comments:
Shostack> allows file reading<br> Frech> XF:http-cgi-webcom-guestbook<br> Christey> CVE-1999-0287 is probably a duplicate of CVE-1999-0467. In NTBUGTRAQ:19990409 Webcom's CGI Guestbook for Win32 web servers Mnemonix says that he had previously reported on a similar problem. Let's refer to the NTBugtraq posting as CVE-1999-0467. We will refer to the "previous report" as CVE-1999-0287, which could be found at: http://oliver.efri.hr/~crv/security/bugs/NT/httpd41.html 0287 describes an exploit via the "template" hidden variable. The exploit describes manually editing the HTML form to change the filename to read from the template variable. The exploit as described in 0467 encodes the template variable directly into the URL. However, hidden variables are also encoded into the URL, which would have looked the same to the web server regardless of the exploit. Therefore 0287 and 0467 are the same.<br> Christey> BID:2024<br>
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
Status:EntryThe Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL.
Status:EntryThe WinGate telnet proxy allows remote attackers to cause a denial of service via a large number of connections to localhost.
Status:EntryThe WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication.
Status:EntryDenial of service through Winpopup using large user names.
Status:EntryAAA authentication on Cisco systems allows attackers to execute commands without authorization.
Status:EntryAll records in a WINS database can be deleted through SNMP for a denial of service.
Status:EntrySolaris sysdef command allows local users to read kernel memory, potentially leading to root privileges.
Status:EntrySolaris volrmmount program allows attackers to read any file.
Status:EntryBuffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
Status:Entryypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.
Status:CandidateACCEPT(4) Cole, Dik, Levy, Northcutt<br> MODIFY(1) Frech<br> NOOP(3) Baker, Christey, Shostack<br>Voter Comments:
Christey> ADDREF BID:1441 URL:http://www.securityfocus.com/bid/1441<br> Dik> If you run with "-ypset", then you're always insecure. With ypsetme, only root on the local host can run ypset in Solaris 2.x+. Probably true for SunOS 4, hence my vote.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> ADDREF XF:ypbind-ypset-root<br> CHANGE> [Dik changed vote from REVIEWING to ACCEPT]<br> Dik> This vulnerability does exist in SunOS 4.x in non default configurations. In Solaris 2.x, the vulnerability only applies to files named "cache_binding" and not all files ending in .2 Both releases are not vulnerable in the default configuration (both disabllow ypset by default which prevents this problem from occurring)<br>
Buffer overflow in FreeBSD lpd through long DNS hostnames.
Status:Entrynis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers.
Status:EntryBuffer overflow in SunOS/Solaris ps command.
Status:EntrySunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server.
Status:EntryBuffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
Status:Entrymmap function in BSD allows local attackers in the kmem group to modify memory through devices.
Status:EntryThe system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
Status:Entrybuffer overflow in HP xlock program.
Status:CandidateACCEPT(3) Baker, Frech, Northcutt<br> MODIFY(1) Prosser<br> NOOP(1) Shostack<br> REJECT(1) Christey<br>Voter Comments:
Prosser> This is another of those with multiple affected OSs. Refs: CA-97.13, http://207.237.120.45/linux/xlock-exploit.txt, HPSBUX9711-073, SGI 19970502-02-PX, Sun Bulletin 000150<br> Christey> XF:hp-xlock points to SGI:19970502-02-PX which says this is the same problem as in CERT:CA-97.13, which is CVE-1999-0038.<br>
Buffer overflow in HP-UX cstm program allows local users to gain root privileges.
Status:CandidateACCEPT(2) Frech, Northcutt<br> NOOP(3) Baker, Prosser, Shostack<br> RECAST(1) Christey<br>Voter Comments:
Prosser> only ref I can find is an old SOD exploit on www.outpost9.com<br> Christey> MERGE CVE-1999-0336 (the exact exploit works with both cstm and mstm, which are clearly part of the same package, so CD:SF-EXEC says to merge them.) Also, there does not seem to be any recognition of this problem by HP. The only other information besides the Bugtraq post is the SOD exploit. See the original post: http://www.securityfocus.com/templates/archive.pike?list=1&date=1996-11-15&msg=Pine.LNX.3.91.961116112242.15276J-100000@underground.org<br>
HP-UX gwind program allows users to modify arbitrary files.
Status:EntryHP-UX vgdisplay program gives root access to local users.
Status:EntrySSH 1.2.25 on HP-UX allows access to new user accounts.
Status:Entryfpkg2swpk in HP-UX allows local users to gain root access.
Status:EntryHP ypbind allows attackers with root privileges to modify NIS data.
Status:Entrydisk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
Status:Entryioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
Status:EntryBuffer overflow in Solaris fdformat command gives root access to local users.
Status:EntryBuffer overflow in Linux splitvt command gives root access to local users.
Status:EntryBuffer overflow in Linux su command gives root access to local users.
Status:CandidateACCEPT(3) Frech, Hill, Northcutt<br> NOOP(1) Prosser<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> DUPE CVE-1999-0845? Also, ADDREF XF:unixware-su-username-bo A report summary by Aleph One states that nobody was able to confirm this problem on any Linux distribution.<br> Baker> If this is the same as the unixware, the n it is a dupe of 1999-0845. There is about a two and half month difference in the bugtraq reporting of these. Sounds like the same bug however...<br> Christey> XF:su-bo no longer seems to exist. How about XF:linux-subo(734) ? http://xforce.iss.net/static/734.php BID:475 also seems to describe the same problem (http://www.securityfocus.com/bid/475) in which case, vsyslog is blamed in: BUGTRAQ:19971220 Linux vsyslog() overflow http://www.securityfocus.com/archive/1/8274<br>
Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.
Status:EntryBuffer overflow in xmcd 2.1 allows local users to gain access through a user resource setting.
Status:CandidateACCEPT(3) Frech, Hill, Northcutt<br> NOOP(2) Baker, Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> BUGTRAQ:19961126 Security Problems in XMCD 2.1 A followup to this post says that xmcd is not suid here.<br>
SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files.
Status:EntryBuffer overflow in Solaris kcms_configure command allows local users to gain root access.
Status:EntryThe open() function in FreeBSD allows local attackers to write to arbitrary files.
Status:EntryFreeBSD mmap function allows users to modify append-only or immutable files.
Status:Entryppl program in HP-UX allows local users to create root files through symlinks.
Status:Entryvhe_u_mnt program in HP-UX allows local users to create root files through symlinks.
Status:EntryVulnerability in HP-UX mediainit program.
Status:EntrySGI syserr program allows local users to corrupt files.
Status:EntrySGI permissions program allows local users to gain root privileges.
Status:EntrySGI mediad program allows local users to gain root access.
Status:EntryLinux bdash game has a buffer overflow that allows local users to gain root access.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Northcutt, Shostack, Wall<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> XF:bdash-bo<br>
Buffer overflow in Internet Explorer 4.0(1).
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(2) Frech, Shostack<br> RECAST(1) Prosser<br> REJECT(2) Christey, LeBlanc<br>Voter Comments:
Shostack> this is a high cardinality item<br> Prosser> needs to be more specific.<br> Frech> Replace reference with XF:iemk-bug (msie-bo is obsolete and a vague duplicate) Description (from xfdb): Some versions of Internet Explorer for Windows contain a vulnerability that may crash the broswer when a malicious web site contains a certain kind of URL (that begins with "mk://") with more characters than the browser supports. <br> Christey> The description is too vague.<br> LeBlanc> too vague<br> Christey> Add period to the end of the description.<br>
Buffer overflow in NetMeeting allows denial of service and remote command execution.
Status:EntryHP OpenView Omniback allows remote execution of commands as root via spoofing, and local users can gain root access via a symlink attack.
Status:CandidateACCEPT(2) Baker, Frech<br> MODIFY(1) Prosser<br> RECAST(1) Christey<br>Voter Comments:
Prosser> additional source HP Security Bulletin 85 http://us-support.external.hp.com http://europe-support.external.hp.com<br> Christey> Two separate bugs, so SF-LOC says this candidate should be split<br> Christey> ADDREF CIAC:J-007 URL:http://ciac.llnl.gov/ciac/bulletins/j-007.shtml<br>
In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access.
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:EntryBuffer overflow in mstm in HP-UX allows local users to gain root access.
Status:CandidateACCEPT(2) Frech, Northcutt<br> NOOP(3) Baker, Prosser, Shostack<br> RECAST(1) Christey<br>Voter Comments:
Prosser> same as CVE-1999-0307, only ref I can find is an old SOD exploit on www.outpost9.com<br> Christey> MERGE CVE-1999-0307 (the exact exploit works with both cstm and mstm, which are clearly part of the same package, so CD:SF-EXEC says to merge them.) Also, there does not seem to be any recognition of this problem by HP. The only other information besides the Bugtraq post is the SOD exploit.<br>
AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled.
Status:EntryAIX Licensed Program Product performance tools allow local users to gain root access.
Status:EntryBuffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access.
Status:EntryBuffer overflow in Linux Slackware crond program allows local users to gain root access.
Status:EntryBuffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Status:EntryLinux PAM modules allow local users to gain root access using temporary files.
Status:EntryA malicious Palace server can force a client to execute arbitrary programs.
Status:EntryNT users can gain debug-level access on a system process using the Sechole exploit.
Status:EntryJolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
Status:CandidateACCEPT(2) Blake, Cole<br> MODIFY(2) Frech, Wall<br> NOOP(4) Bishop, Landfield, Northcutt, Ozancin<br> RECAST(1) Meunier<br> REJECT(4) Armstrong, Baker, LeBlanc, Levy<br> REVIEWING(1) Christey<br>Voter Comments:
Wall> Invalid ICMP datagram fragments causes a denial of service in Windows 95 and Windows NT systems. Reference: Q154174. Jolt is also known as sPING, ICMP bug, Icenewk, and Ping of Death. It is a modified teardrop 2 attack. <br> Frech> XF:nt-ssping ADDREF XF:ping-death ADDREF XF:teardrop-mod ADDREF XF:mpeix-echo-request-dos<br> Christey> I can't tell whether the Jolt exploit at: http://www.securityfocus.com/templates/archive.pike?list=1&date=1997-06-28&msg=Pine.BSF.3.95q.970629163422.3264A-200000@apollo.tomco.net is exploiting any different flaw than teardrop does.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Baker> Jolt (original) is basically just a fragmented oversized ICMP that kills Win boxes ala Ping of Death. Teardrop is altering the offset in fragmented tcp packets so that the end of subsequent fragments is inside first packet... Teardrop 2 is UDP packets, if I remember right. Seems like Jolt (original, not jolt 2) is just exploit code that creates a ping of death (CVE 1999-0128)<br> Levy> I tend to agree with Baker.<br> CHANGE> [Armstrong changed vote from REVIEWING to REJECT]<br> Armstrong> This code does not use fragment overlap. It is simply a large ICMP echo request.<br> Christey> See the SCO advisory at: http://www.securityfocus.com/templates/advisory.html?id=1411 which may further clarify the issue.<br> LeBlanc> This is a hodge-podge of DoS attacks. Jolt isn't the same thing as ping of death - POD was an oversized ICMP packet, Jolt froze Linux and Solaris (and I think not NT), IIRC Jolt2 did get NT boxes. Teardrop and teardrop2 were related attacks (usually ICMP frag attacks), but each of these is a distinct vulnerability, affected a discrete group of systems, and should have distinct CVE numbers. CVE entries should be precise as to what the problem is.<br> Meunier> I agree with Leblanc in that Jolt is multi-faceted. Jolt has characteristics of Ping of Death AND teardrop, but it doesn't do either exactly. Moreover, it sends a truncated IP fragment. I disagree with Armstrong; jolt uses overlapping fragments. It's not a simple ping of death either. It may be that the author's intent was to construct a "super attack" somehow combining elements of other vulnerabilities to try to make it more potent. In any case it succeeded in confusing the CVE board :-). I notice that Jolt uses echo replies (type 0) instead of echo requests (to get past firewalls?). Jolt is peculiar in that it also sends numerous overlapping fragments. The "Pascal Simulator" :-) says it sends: - 172 fragments of length 400 with offset starting at 5120 and<br> increasing by about 47 (odd arithmetic of 5120 OR ((n* 380) > > 3)), which eventually results in sending fragments inside an already<br> covered area once ((n* 380) > > 3) is greater than 5120, which occurs when n is reaches 108. This would look a bit like TearDrop if fragments were reassembled on-the-fly. - 1 fragment such that the total length of all the fragments is greater than 65535 (my calculation is 172*380 + 418 = 65778; the comment about 65538 must be wrong). The last packet is size 418 according to the IP header but the buffer is of size 400. The sendto takes as argument the size of the buffer so a truncated packet is sent. So, I am not sure if the problem is because the last packet doesn't extend to the payload it says it has or because the total size of all fragments is greater than 65535. The author says it may take more than one sending, so perhaps this has to do with an incorrect error handling and recovery. One would need to experiment and isolate each of those characteristics and test them independently. Inasmuch as each of those things is likely a different vulnerability, then I agree with Leblanc that this entry should be split. I'll try that if I ever get bored. Jolt 2 should also have a different entry (see below). Jolt 2 runs in an infinite loop, sending the same fragmented IP packet, which can pretend to be "ICMP" or "UDP" data; however this is meaningless, as it's just a late fragment of an IP packet. The attack works only as long as packets are sent. According to http://www.securityfocus.com/archive/1/62170 the packets are truncated, and would overflow over the 65535 byte limit, which is similar to Jolt. Note that Jolt does send that much data whereas jolt2 doesn't. Since jolt2 is simpler and narrower than jolt, and it has weaker consequences, I believe that it's a different vulnerability. "Jolt 2 vulnerability causes a temporary denial-of-service in Windows-type OSes" would be a title for it.<br>
CGI PHP mlog script allows an attacker to read any file on the target server.
Status:EntryInternet Explorer 4.01 allows remote attackers to read local files and spoof web pages via a "%01" character in an "about:" Javascript URL, which causes Internet Explorer to use the domain specified after the character.
Status:CandidateACCEPT(4) Baker, LeBlanc, Levy, Northcutt<br> MODIFY(2) Frech, Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Prosser> this is a modified Cross-Frame vulnerability that circumvents the original Cross-Frame Patch. Addressed in MS Bulletin MS99.012 http://www.microsoft.com/security/bulletins/ms99-012.asp<br> Christey> Duplicate of CVE-1999-0490?<br> LeBlanc> If Prosser is correct that this is MS99-012, accept<br> Christey> BUGTRAQ:19990126 Javascript ecurity bug in Internet Explorer URL:http://marc.theaimsgroup.com/?l=bugtraq&m=91745430007021&w=2 NTBUGTRAQ:19990128 Javascript %01 bug in Internet Explorer URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=91756771207719&w=2 BID:197 URL:http://www.securityfocus.com/bid/197<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:ie-window-spoof(2069)<br>
IIS ASP caching problem releases sensitive information when two virtual servers share the same physical directory.
Status:EntryA buffer overflow in the FTP list (ls) command in IIS allows remote attackers to conduct a denial of service and, in some cases, execute arbitrary commands.
Status:EntryRace condition in the db_loader program in ClearCase gives local users root access by setting SUID bits.
Status:EntryFTP PASV "Pizza Thief" denial of service and unauthorized data access. Attackers can steal data by connecting to a port that was intended for use by a client.
Status:EntryControlIT 4.5 and earlier (aka Remotely Possible) has weak password encryption.
Status:CandidateACCEPT(2) Baker, Frech<br> NOOP(2) Northcutt, Wall<br> RECAST(1) Ozancin<br>Voter Comments:
Ozancin> Can we combine this with CVE-1999-0356 - ControlIT(tm) 4.5 and earlier uses weak encryption.<br>
rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.
Status:EntryInternet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious email message.
Status:CandidateACCEPT(3) Baker, Ozancin, Wall<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:word97-template-macro<br> Christey> CHANGEREF NTBUGTRAQ:19990127 IE 4/5/Outlook + Word 97 security hole URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=91747570922757&w=2 BID:196 http://www.securityfocus.com/bid/196<br> Christey> MSKB:Q214652 http://support.microsoft.com/support/kb/articles/q214/6/52.asp<br>
Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.
Status:EntryControlIT v4.5 and earlier uses weak encryption to store usernames and passwords in an address book.
Status:CandidateACCEPT(2) Baker, Frech<br> NOOP(2) Northcutt, Wall<br> RECAST(1) Ozancin<br>Voter Comments:
Windows 98 and other operating systems allows remote attackers to cause a denial of service via crafted "oshare" packets, possibly involving invalid fragmentation offsets.
Status:EntryDigital Unix 4.0 has a buffer overflow in the inc program of the mh package.
Status:Entryptylogin in Unix systems allows users to perform a denial of service by locking out modems, dial out with that modem, or obtain passwords.
Status:CandidateACCEPT(2) Cole, Frech<br> MODIFY(1) Baker<br>Voter Comments:
Frech> XF:ptylogin-dos <br> Baker> Should say "... lock out a modem, ..." rather than "... locking out modems..."<br>
MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely.
Status:CandidateACCEPT(6) Blake, Cole, Collins, Landfield, Northcutt, Wall<br> MODIFY(3) Baker, Frech, LeBlanc<br> NOOP(4) Armstrong, Christey, Ozancin, Prosser<br>Voter Comments:
Christey> I can't find the original Bugtraq posting (it appears that mnemonix discovered the problem).<br> LeBlanc> - if there was a fix or a KB article, I'd ACCEPT. A vuln based on a BUGTRAQ posting we can't find could be anything. <br> Baker> Vulnerability Reference (HTML) Reference Type http://www.securityfocus.com/archive/1/12218 Misc Defensive InfoVulnerability Reference (HTML) Reference Type THis is the URL for the Bugtraq posting. It was cross posted to NT Bugtraq as well, but identical text. It was Mnemonix...<br> Christey> BID:1811 URL:http://www.securityfocus.com/bid/1811<br> Christey> CHANGEREF BUGTRAQ add "Server 2." to the subject. Also standardize NTBUGTRAQ reference title.<br> Christey> Add "uploadn.asp" to the description.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:siteserver-user-dir-permissions(5384)<br>
NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br>Voter Comments:
Frech> XF:compulink-pw-laserfiche(1679) Normalize BUGTRAQ reference to: BUGTRAQ:19990129 Compulink LaserFiche Client/Server - unencrypted passwords<br>
WS_FTP server remote denial of service through cwd command.
Status:EntrySuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise.
Status:EntryMicrosoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
Status:CandidateACCEPT(2) Baker, LeBlanc<br> MODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br>Voter Comments:
CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:access-weak-passwords(1774) An older published reference (from our own Adam) would be better: ailab.coderpunks Newsgroup, 1998/06/23 "Re: MS Access 2.0" http://x15.dejanews.com/[ST_rn=ps]/getdoc.xp?AN=365308578&CONTEXT=9192 07028.1462108427&hitnum=1<br>
The metamail package allows remote command execution using shell metacharacters that are not quoted in a mailcap entry.
Status:EntryIn some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Status:EntryNetBSD netstat command allows local users to access kernel memory.
Status:EntryBuffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Status:EntryThe Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.
Status:EntryIn Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.
Status:CandidateACCEPT(4) Baker, Dik, Northcutt, Prosser<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Reference: XF:sun-man<br> Christey> ADDREF CIAC:J-028 Is the Linux man symlink problem the same as the one for Sun? See BUGTRAQ:19990602 /tmp symlink problems in SuSE Linux 6.1 Also see BID:305<br> Dik> sun bug 4154565<br>
Lynx allows a local user to overwrite sensitive files through /tmp symlinks.
Status:EntryThe installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.
Status:EntryBuffer overflow in the "Super" utility in Debian GNU/Linux, and other operating systems, allows local users to execute commands as root.
Status:EntryDebian GNU/Linux cfengine package is susceptible to a symlink attack.
Status:EntryBuffer overflow in webd in Network Flight Recorder (NFR) 2.0.2-Research allows remote attackers to execute commands.
Status:EntryLocal users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Status:EntryProcess table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services.
Status:EntryInterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands.
Status:EntryMicrosoft Taskpads allows remote web sites to execute commands on the visiting user's machine via certain methods that are marked as Safe for Scripting.
Status:EntrySLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user.
Status:Entrysuper 3.11.6 and other versions have a buffer overflow in the syslog utility which allows a local user to gain root access.
Status:CandidateACCEPT(7) Baker, Blake, Cole, Frech, Landfield, Levy, Ozancin<br> MODIFY(1) Bishop<br> NOOP(2) Armstrong, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Is this the same as CVE-1999-0373? They both have the same X-Force reference. BID:342 suggests that there are two. http://www.debian.org/security/1999/19990215a suggests that there are two. However, CVE-1999-0373 is written up in a fashion that is too general; and both XF:linux-super-bo and XF:linux-super-logging-bo refer to CVE-1999-0373. CVE-1999-0373 may need to be split. <br> Frech> From what I can surmise, ISS released the original advisory (attached to linux-super-bo), and Sekure SDI expanded on it by releasing another related overflow in syslog (which is linux-super-logging-bo). When I was originally assigning these issues, I placed both XF references and the ISS advisory on the -0373 candidate, since there was nothing else available. Based on the information above, I'd request that XF:linux-super-logging-bo be removed from CVE-1999-0373.<br> Christey> Given Andre's feedback, these are different issues. CVE-1999-0373 does not need to be split because the ISS reference is sufficient to distinguish that CVE from this candidate; however, the CVE-1999-0373 description should probably be modified slightly.<br> Bishop> (as indicated by Christey)<br> CHANGE> [Cole changed vote from NOOP to ACCEPT]<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> There are 2 bugs, as confirmed by the super author at: BUGTRAQ:19990226 Buffer Overflow in Super (new) http://www.securityfocus.com/archive/1/12713 BID:397 also seems to cover this one, and it may cover CVE-1999-0373 as well.<br>
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges.
Status:EntryACC Tigris allows public access without a login.
Status:EntryThe Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.
Status:EntryThe LDAP bind function in Exchange 5.5 has a buffer overflow that allows a remote attacker to conduct a denial of service or execute commands.
Status:EntryMicrosoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL.
Status:EntryA legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to read plaintext network passwords.
Status:EntryDataLynx suGuard trusts the PATH environment variable to execute the ps command, allowing local users to execute commands as root.
Status:EntryBuffer overflow in the bootp server in the Debian Linux netstd package.
Status:CandidateACCEPT(3) Baker, Ozancin, Stracener<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Is CVE-1999-0389 a duplicate of CVE-1999-0798? CVE-1999-0389 has January 1999 dates associated with it, while CVE-1999-0798 was reported in late December. Also, is this the same line of code as CVE-1999-0914? Both are in the netstd package, it could look like a library problem. However, deep in the changelog in the netstd_3.07-7slink.3.diff on Debian, Herbert Xu includes the following entry: +netstd (3.07-7slink.1) frozen; urgency=high + + * bootpd: Applied patch from Redhat as well as a fix for the overflow in + report() (fixes #30675). + * netkit-ftp: Applied patch from RedHat that fixes some obscure overflow + bugs. + + -- Herbert Xu <herbert@debian.org> Sat, 19 Dec 1998 14:36:48 +1100 This tells me that two separate bugs are involved. Note that Red Hat posted *some* fix for *some* bootp problem in June 1998. See: http://www.redhat.com/support/errata/rh42-errata-general.html#bootp<br> Frech> XF:debian-netstd-bo<br> Christey> Further analysis indicates that this is a duplicate of CVE-1999-0799<br> CHANGE> [Christey changed vote from REJECT to REVIEWING]<br> Christey> The fix information for BID:324 suggests that there are two overflows, one of which is in handle_request (bootpd.c) and is likely related to a file name; but there is another issue in report (report.c) which also looks like a straightforward overflow, which would suggest that this is not a duplicate of CVE-1999-0798 or CVE-1999-0799. Note: see comments for CVE-1999-0798 which explain how that candidate is not related to CVE-1999-0799.<br>
Buffer overflow in Dosemu Slang library in Linux.
Status:EntryThe cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
Status:EntryBuffer overflow in Thomas Boutell's cgic library version up to 1.05.
Status:EntryRemote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers.
Status:EntryDPEC Online Courseware allows an attacker to change another user's password without knowing the original password.
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Christey<br> REJECT(1) Frech<br>Voter Comments:
Frech> If I understand the issue, this HIGHCARD involves insecure web programming. If I don't understand, mark this as my first NOOP.<br> Christey> CONFIRM:http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D19990803132618.16407.qmail%40securityfocus.com ADDREF BID:565 URL:http://www.securityfocus.com/vdb/bottom.html?vid=565<br>
A race condition in the BackWeb Polite Agent Protocol allows an attacker to spoof a BackWeb server.
Status:EntryA race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.
Status:EntryThe demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext.
Status:CandidateACCEPT(1) Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Wall<br>Voter Comments:
Wall> Reject based on beta copy.<br> Frech> XF:quakenbush-pw-appraiser(1652)<br>
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> Followups to the bugtraq message (1/24/99) indicate that 1.2.27 was not yet released. v1.2.26 should be substituted in the description for '27. XF:ssh-exp-account-access<br>
The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:mirc-dcc-metachar-filename<br>
Denial of service in Linux 2.2.0 running the ldd command on a core file.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> BUGTRAQ:Jan27,1999 (http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-01-22& msg=Pine.LNX.4.05.9901270538380.539-100000@vitelus.com) XF:linux-kernel-ldd-dos<br>
A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:linux-race-condition-proc<br>
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
Status:EntryA bug in Cyrix CPUs on Linux allows local users to perform a denial of service.
Status:EntryBuffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.
Status:EntryA buffer overflow in lsof allows local users to obtain root privilege.
Status:EntryDigital Unix Networker program nsralist has a buffer overflow which allows local users to obtain root privilege.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> In description, change 'which' to 'that'.<br>
By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system.
Status:EntryFiles created from interactive shell sessions in Cobalt RaQ microservers (e.g. .bash_history) are world readable, and thus are accessible from the web server.
Status:EntryBuffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access.
Status:EntryThe cancel command in Solaris 2.6 (i386) has a buffer overflow that allows local users to obtain root access.
Status:EntrySeveral startup scripts in SCO OpenServer Enterprise System v 5.0.4p, including S84rpcinit, S95nis, S85tcp, and S89nfs, are vulnerable to a symlink attack, allowing a local user to gain root access.
Status:CandidateMODIFY(2) Baker, Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> Neither XFDB nor the BugTraq article (incidentally, shows up as 7 March, not 19 February) does not mention gaining root access... it says a local user could "delete or overwrite arbitrary files on the system."<br> Baker> By overwriting arbitrary files, one could then gain root access. I agree with a minor description change to reflect this.<br> Christey> Normalize Bugtraq reference to: BUGTRAQ:19990307 Little exploit for startup scripts (SCO 5.0.4p). http://marc.theaimsgroup.com/?l=bugtraq&m=92087765014242&w=2 Also, SCO:SB-99.17 ftp://ftp.sco.com/SSE/security_bulletins/SB-99.17c<br>
In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension.
Status:EntryA buffer overflow in the SGI X server allows local users to gain root access through the X server font path.
Status:EntryIn Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
Status:EntryThe HTTP server in Cisco 7xx series routers 3.2 through 4.2 is enabled by default, which allows remote attackers to change the router's configuration.
Status:EntryVulnerability in Cisco 7xx series routers allows a remote attacker to cause a system reload via a TCP connection to the router's TELNET port.
Status:Entry64 bit Solaris 7 procfs allows local users to perform a denial of service.
Status:EntryDenial of service in SMTP applications such as Sendmail, when a remote attacker (e.g. spammer) uses many "RCPT TO" commands in the same connection.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(3) Baker, Foat, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> DUPE CVE-1999-0144 and CVE-1999-0250?<br> Frech> XF:smtp-rctpto-dos(7499)<br>
When the Microsoft SMTP service attempts to send a message to a server and receives a 4xx error code, it quickly and repeatedly attempts to redeliver the message, causing a denial of service.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, LeBlanc<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:smtp-4xx-error-dos<br> LeBlanc> - if we can find a KB or something that shows that this wasn't just user error, I'd vote ACCEPT.<br> Christey> David Lemson, Microsoft SMTP Service Program Manager, posted a followup that said "We have confirmed this as a problem..." http://marc.theaimsgroup.com/?l=bugtraq&m=92171608127206&w=2<br>
umapfs allows local users to gain root privileges by changing their uid through a malicious mount_umap program.
Status:EntryDuring a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
Status:EntryIn some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the "noexec" flag set.
Status:EntryVulnerability in hpterm on HP-UX 10.20 allows local users to gain additional privileges.
Status:Entrytalkback in Netscape 4.5 allows a local user to overwrite arbitrary files of another user whose Netscape crashes.
Status:Entrytalkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.
Status:EntryThe default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Christey<br>Voter Comments:
Frech> XF:linux-dev-kmem-spoof<br> Christey> DUPE CVE-1999-0414 XF:linux-dev-kmem-spoof does not exist.<br> Christey> *Now* XF:linux-dev-kmem-spoof(3500) exists...<br>
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> Change version number to 4.2beta. Second to last paragraph in bugtraq reference states: "Both the Win 95 and Win NT versions, along with the 4.2 beta of Eudora are affected."<br> Christey> This issue seems to have been rediscovered in BUGTRAQ:20000515 Eudora Pro & Outlook Overflow - too long filenames again http://marc.theaimsgroup.com/?l=bugtraq&m=95842482413076&w=2 Also see BUGTRAQ:19990320 Eudora Attachment Buffer Overflow http://marc.theaimsgroup.com/?l=bugtraq&m=92195396912110&w=2 Is this a duplicate/subsumed by CVE-1999-0004?<br>
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
Status:EntryThe Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
Status:EntryCisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.
Status:EntryLinux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:linux-zerolength-fragment <br> Christey> Consider adding BID:2247<br>
ftp on HP-UX 11.00 allows local users to gain privileges.
Status:EntryXFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Status:EntryXFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:xfree86-xfs-symlink-dos<br> Christey> Is this the same problem as CVE-1999-0433? CVE-1999-0433 deals with a symlink attack on one file (/tmp/.X11-unix), while xfs (this candidate) deals with /tmp/.font-unix XF:xfree86-xfs-symlink-dos doesn't exist.<br> Christey> ADDREF DEBIAN:19990331 symbolic link can be used to make any file world readable Note: Debian's advisory says that this is not a problem for Debian.<br>
MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:hp-servicegaurd<br> Christey> ADDREF CIAC:J-039<br> Christey> Note the typo in Andre's suggested reference. Normalize to XF:hp-serviceguard(2046)<br>
Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.
Status:EntryRemote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.
Status:EntryRemote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.
Status:EntryBuffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
Status:EntryThe byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.
Status:EntryRemote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
Status:EntrySolaris ff.core allows local users to modify files.
Status:EntryPatrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> Change "Patrol management software" to "The PATROL management product from BMC Software".<br>
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br>Voter Comments:
Frech> ADDREF: XF:windows-arp-dos <br>
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
Status:EntryLocal users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
Status:EntryLocal users can gain privileges using the debug utility in the MPE/iX operating system.
Status:EntryIIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
Status:EntryThe ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
Status:EntryIn IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Status:CandidateACCEPT(2) Ozancin, Wall<br> NOOP(2) Baker, Christey<br> REJECT(2) Frech, LeBlanc<br>Voter Comments:
Frech> Can't find in database.<br> Christey> This looks like another discovery of CVE-2000-0071 <br> LeBlanc> - I just tried to repro this based on the BUGTRAQ vuln information, and it does not repro - GET /bogus.pl HTTP/1.0 HTTP/1.1 404 Object Not Found Server: Microsoft-IIS/5.0 Date: Thu, 05 Oct 2000 21:04:20 GMT Content-Length: 3243 Content-Type: text/html No path is returned whatsoever. This may have been a problem on some version of IIS in the past, but the BUGTRAQ ID says all versions are vulnerable. Let's try and figure out what version had the problem, whether it is intrinsic to IIS or the result of adding a 3rd party implementation of perl, and when it got fixed, then we can try again.<br> CHANGE> [Frech changed vote from REVIEWING to REJECT]<br> Christey> Add "no-such-file.pl" as an example to the desc, to facilitate search (it's used by CGI scanners and in the original example)<br>
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:linux-ports-dos(8364)<br>
A service or application has a backdoor password that was placed there by the developer.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Frech<br>Voter Comments:
Frech> Much too broad. Also may be HIGHCARD (or will be in the future).<br> Baker> I think we want to address this using the dot notation idea. We do need to address this, just not a separate entry for every single occurance.<br>
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
Status:CandidateACCEPT(2) Baker, Balinsky<br> MODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:cisco-ident(2289) ADDREF BUGTRAQ:19990118 Remote Cisco Identification In description, probably better to use "Cisco" as product/company name.<br> Balinsky> CiscoSecure IDS has a signature for this...ID 3602 Cisco IOS Identity.<br> Christey> There may be a slight abstraction problem here, e.g. look at the candidate for queso/nmap; also see followup Bugtraq post from "Basement Research" on 19990120 which says that there are many other features in Cisco products that allow remote identification.<br> Christey> fix typo: "Dicsovery"<br>
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Christey, Wall<br> REJECT(2) Baker, Northcutt<br>Voter Comments:
Northcutt> Nmap and queso are the tip of the iceberg and not the most advanced ways to accomplish this. To pursue making the world signature free is as much a vulnerability as having signatures, nay more.<br> Frech> XF:decod-nmap(2053) XF:decod-queso(2048)<br> Christey> Add "fingerprinting" to facilitate search. Some references: MISC:http://www.insecure.org/nmap/nmap-fingerprinting-article.html BUGTRAQ:19981228 A few more fingerprinting techniques - time and netmask http://marc.theaimsgroup.com/?l=bugtraq&m=91489155019895&w=2 BUGTRAQ:19990222 Preventing remote OS detection http://marc.theaimsgroup.com/?l=bugtraq&m=91971553006937&w=2 BUGTRAQ:20000901 ICMP Usage In Scanning v2.0 - Research Paper http://marc.theaimsgroup.com/?l=bugtraq&m=96791499611849&w=2 BUGTRAQ:20000912 Using the Unused (Identifying OpenBSD, http://marc.theaimsgroup.com/?l=bugtraq&m=96879267724690&w=2 BUGTRAQ:20000912 The DF Bit Playground (Identifying Sun Solaris & OpenBSD OSs) http://marc.theaimsgroup.com/?l=bugtraq&m=96879481129637&w=2 BUGTRAQ:20000816 TOSing OSs out of the window / Fingerprinting Windows 2000 with http://marc.theaimsgroup.com/?l=bugtraq&m=96644121403569&w=2 BUGTRAQ:20000609 p0f - passive os fingerprinting tool http://marc.theaimsgroup.com/?l=bugtraq&m=96062535628242&w=2<br> Baker> I think we can probably reject this as the corollary is that you can identify OS from a IP/TCP packet sent by a system, looking at various parts of the SYN packet. Unless we believe that all systems should always use identical packet header/identical responses, in which case the protocol should not permit variation.<br>
The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
Status:CandidateACCEPT(3) Balinsky, Frech, Ozancin<br> MODIFY(1) Wall<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Wall> The reference should be ASB99-01 (Expression Evaluator Security Issues) make application plural since there are three sample applications (openfile.cfm, displayopenedfile.cfm, and exprcalc.cfm).<br> Christey> The CD:SF-EXEC and CD:SF-LOC content decisions apply here. Since there are 3 separate "executables" with the same (or similar) problem, we need to make sure that CD:SF-EXEC determines what to do here. There is evidence that some of these .cfm scripts have an "include" file, and if so, then CD:SF-LOC says that we shouldn't make separate entries for each of these scripts. On the other hand, the initial L0pht discovery didn't include all 3 of these scripts, and as far as I can tell, Allaire had patched the first problem before the others were discovered. So, CD:DISCOVERY-DATE may argue that we should split these because the problems were discovered and patched at different times. In any case, this candidate can not be accepted until the Editorial Board has accepted the CD:SF-EXEC, CD:SF-LOC, and CD:DISCOVERY-DATE content decisions.<br>
Linux ftpwatch program allows local users to gain root privileges.
Status:EntryL0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
Status:EntryLocal users can perform a denial of service in Alpha Linux, using MILO to force a reboot.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Baker, Northcutt<br> REJECT(1) Wall<br>Voter Comments:
Wall> Reject based on beta copy.<br>
Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service.
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:linux-autofs-bo(8365)<br>
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
Status:CandidateMODIFY(1) Frech<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> ADDREF XF:pmap-sset<br> Christey> CVE-1999-0195 = CVE-1999-0461 ? If this is approved over CVE-1999-0195, make sure it gets XF:pmap-sset<br> Baker> THis does appear to be a duplicate. We should accept 1999-0195, since it already has the votes and get rid of this one<br>
suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:perl-suidperl-bo<br> Christey> XF:perl-suidperl-bo doesn't exist.<br>
Remote attackers can perform a denial of service using IRIX fcagent.
Status:EntryLocal users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
Status:EntryRemote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
Status:CandidateACCEPT(2) Frech, Northcutt<br> NOOP(1) Baker<br> REJECT(2) LeBlanc, Wall<br>Voter Comments:
Wall> Reject based on client-side DoS<br> LeBlanc> Client side DOS<br>
The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device.
Status:EntryThe Webcom CGI Guestbook programs wguest.exe and rguest.exe allow a remote attacker to read arbitrary files using the "template" parameter.
Status:CandidateACCEPT(4) Blake, Frech, Landfield, Ozancin<br> NOOP(3) Baker, Christey, Northcutt<br>Voter Comments:
Christey> CVE-1999-0287 is probably a duplicate of CVE-1999-0467. In NTBUGTRAQ:19990409 Webcom's CGI Guestbook for Win32 web servers Mnemonix says that he had previously reported on a similar problem. Let's refer to the NTBugtraq posting as CVE-1999-0467. We will refer to the "previous report" as CVE-1999-0287, which can be found at: http://oliver.efri.hr/~crv/security/bugs/NT/httpd41.html 0287 describes an exploit via the "template" hidden variable. The exploit describes manually editing the HTML form to change the filename to read from the template variable. The exploit as described in 0467 encodes the template variable directly into the URL. However, hidden variables are also encoded into the URL, which would have looked the same to the web server regardless of the exploit. Therefore 0287 and 0467 are the same.<br> Christey> The CD:SF-EXEC content decision also applies here. We have 2 programs, wguest.exe and rguest.exe, which appear to have the same problem. CD:SF-EXEC needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry. When finalized, CD:SF-EXEC will decide whether this candidate should be split or not.<br> Christey> BID:2024<br>
Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.
Status:EntryInternet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.
Status:CandidateACCEPT(1) Wall<br> NOOP(2) Baker, Northcutt<br> REJECT(3) Christey, Frech, LeBlanc<br>Voter Comments:
Wall> Reference: Microsoft Security Bulletin MS99-012<br> Christey> DUPE CVE-1999-0488<br> Frech> Defer to Christey's vote. However, XF:ie-mshtml-crossframe(2216) assigned to CVE-1999-0488.<br> LeBlanc> Duplicate<br>
A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted.
Status:EntryThe remote proxy server in Winroute allows a remote attacker to reconfigure the proxy without authentication through the "cancel" button.
Status:EntryThe SNMP default community name "public" is not properly removed in NetApps C630 Netcache, even if the administrator tries to disable it.
Status:EntryThe rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
Status:EntryThe ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory.
Status:EntryA race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail.
Status:EntryA weak encryption algorithm is used for passwords in SCO TermVision, allowing them to be easily decrypted by a local user.
Status:CandidateACCEPT(3) Baker, Frech, Ozancin<br> NOOP(3) LeBlanc, Northcutt, Wall<br>Voter Comments:
The Expression Evaluator in the ColdFusion Application Server allows a remote attacker to upload files to the server via openfile.cfm, which does not restrict access to the server properly.
Status:CandidateACCEPT(4) Baker, Christey, Frech, Ozancin<br> REJECT(1) Wall<br>Voter Comments:
Wall> Duplicate of 0455<br> Christey> CVE-1999-0477 and CVE-1999-0455 were discovered at different times. Also, the attack was different. So "Same Attack" and "Same Time of Discovery" dictate that these should remain separate.<br>
Denial of service in HP-UX sendmail 8.8.6 related to accepting connections.
Status:EntryDenial of service Netscape Enterprise Server with VirtualVault on HP-UX VVOS systems.
Status:EntryLocal attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:midnight-commander-symlink-dos<br> Christey> XF:midnight-commander-symlink-dos(3505)<br>
Denial of service in "poll" in OpenBSD.
Status:EntryOpenBSD kernel crash through TSS handling, as caused by the crashme program.
Status:EntryOpenBSD crash using nlink value in FFS and EXT2FS filesystems.
Status:EntryBuffer overflow in OpenBSD ping.
Status:EntryRemote attackers can cause a system crash through ipintr() in ipq in OpenBSD.
Status:EntryDenial of service in AOL Instant Messenger when a remote attacker sends a malicious hyperlink to the receiving client, potentially causing a system crash.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:aol-im.<br> Christey> XF:aol-im appears to be related to the problem discussed in BUGTRAQ:19980224 AOL Instant Messanger Bug This one is related to BUGTRAQ:19990420 AOL Instant Messenger URL Crash<br>
The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.
Status:EntryInternet Explorer 4.0 and 5.0 allows a remote attacker to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability.
Status:CandidateACCEPT(2) Baker, Landfield<br> MODIFY(2) Frech, Wall<br> NOOP(2) Christey, Ozancin<br>Voter Comments:
Frech> XF:ie-mshtml-crossframe<br> Wall> (source: MSKB:Q168485)<br> Christey> CVE-1999-0469 appears to be a duplicate; prefer this one over that one, since this one has an MS advisory. Confirm with Microsoft that these are really duplicates. Also review CVE-1999-0487, which appears to be a similar bug.<br>
MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013.
Status:CandidateACCEPT(1) Levy<br> MODIFY(1) Wall<br> NOOP(2) Baker, Ozancin<br> RECAST(1) Prosser<br> REJECT(1) Christey<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> Wasn't Untrusted scripted paste MS98-015? I can find no mention of a clipboard in either. I cannot proceed on this one without further clarification.<br> Wall> (source: MS:MS99-012)<br> Prosser> agree with Andre here. The Untrusted Scripted paste vulnerability was originally addressed in MS98-015 and it is in the file upload intrinsic control in which an attacker can paste the name of a file on the target's drive in the control and a form submission would then send that file from the attacked machine to the remote web site. This one has nothing to do with the clipboard. What the advisory mentioned here, MS99-012, does is replace the MSHTML parsing engine which is supposed to fix the original Untrusted Scripted Paste issue and a variant, as well as the two Cross-Frame variants and a privacy issue in IMG SRC. The vulnerability that allowed reading of a user's clipboard is the Forms 2.0 Active X control vulnerability discussed in MS99-01<br> Christey> The advisory should have been listed as MS99-012. CVE-1999-0468 describes the untrusted scripted paste problem in MS99-012.<br> Frech> Pending response to guidance request. 12/6/01.<br>
MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to learn information about a local user's files via an IMG SRC tag.
Status:CandidateACCEPT(2) Landfield, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Ozancin<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:ie-scriplet-fileread<br> Christey> Duplicate of CVE-1999-0347?<br>
The prompt parsing in bash allows a local user to execute commands as another user by creating a directory with the name of the command to execute.
Status:EntryThe ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses.
Status:CandidateACCEPT(3) Armstrong, Collins, Northcutt<br> MODIFY(4) Baker, Blake, Frech, Shostack<br> NOOP(4) Christey, Cole, Landfield, Wall<br> REVIEWING(1) Ozancin<br>Voter Comments:
Shostack> isn't that what finger is supposed to do?<br> Landfield> Maybe we need a new category of "unsafe system utilities and protocols"<br> Blake> Ffingerd 1.19 allows remote attackers to differentiate valid and invalid usernames on the target system based on its responses to finger queries.<br> Christey> CHANGEREF BUGTRAQ [canonicalize] BUGTRAQ:19990423 Ffingerd privacy issues http://marc.theaimsgroup.com/?l=bugtraq&m=92488772121313&w=2 Here's the nature of the problem. (1) FFingerd allows users to decide not to be fingered, printing a message "That user does not want to be fingered" (2) If the fingered user does not exist, then FFingerd's intended default is to print that the user does not want to be fingered; however, the error message has a period at the end. Thus, ffingerd can allow someone to determine who valid users on the server are, *in spite of* the intended functionality of ffingerd itself. Thus this exposure should be viewed in light of the intended functionality of the application, as opposed to the common usage of the finger protocol in general. Also, the vendor posted a followup and said that a patch was available. See: http://marc.theaimsgroup.com/?l=bugtraq&m=92489375428016&w=2<br> Baker> Vulnerability Reference (HTML) Reference Type http://www.securityfocus.com/archive/1/13422 Misc Defensive Info<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:ffinger-user-info(5393)<br>
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd.
Status:EntryDenial of service in WinGate proxy through a buffer overflow in POP3.
Status:EntryA remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.
Status:CandidateACCEPT(6) Baker, Blake, Cole, Collins, Northcutt, Ozancin<br> MODIFY(1) Frech<br> NOOP(4) Armstrong, Bishop, Landfield, Wall<br> REVIEWING(2) Christey, Levy<br>Voter Comments:
Frech> XF:nb-dotdotknown(837) References would be appreciated. We've got no reference for this issue; confidence rating is consequently low. <br> Levy> Some refernces: http://www.securityfocus.com/archive/1/3894 http://www.securityfocus.com/archive/1/3533 http://www.securityfocus.com/archive/1/3535<br>
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
Status:EntryAnonymous FTP is enabled.
Status:CandidateACCEPT(1) Shostack<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> ftp-anon(52) at http://xforce.iss.net/static/52.php ftp-anon2(543) at http://xforce.iss.net/static/543.php<br> Christey> Add period to the end of the description.<br> Baker> DOn't know about this, but it may be the only easy way to allow access to data for some folks.<br>
TFTP is not running in a restricted directory, allowing a remote attacker to access sensitive information such as password files.
Status:CandidateACCEPT(3) Blake, Hill, Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:linux-tftp<br> Christey> XF:linux-tftp refers to CVE-1999-0183<br>
NETBIOS share information may be published through SNMP registry keys in NT.
Status:CandidateACCEPT(5) Baker, Northcutt, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br> REJECT(1) LeBlanc<br>Voter Comments:
Frech> Change wording to 'Windows NT.' XF:snmp-netbios<br> LeBlanc> Share info can be obtained via SNMP queries, but I question whether this is a vulnerability. The system can be configured not to do this, and one may argue that SNMP itself is an insecure configuration. Furthermore, the share information isn't published via registry keys - the description could refer to more than one actual issue. SNMP is meant to allow people to obtain information about systems. I'm willing to discuss this with the rest of the board.<br>
A Unix account has a guessable password.
Status:CandidateACCEPT(3) Baker, Northcutt, Shostack<br> RECAST(2) Frech, Meunier<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Guessable falls into the class of CVE-1999-0502, since I can guess a default, null, etc. password. Suggest changing to something like "has an existing non-default password that can be guessed." I'm also including default passwords in this entry. In that vein, we show the following references: XF:user-password XF:passwd-username XF:default-unix-sync XF:default-unix-4dgifts XF:default-unix-bin XF:default-unix-daemon XF:default-unix-lp XF:default-unix-me XF:default-unix-nuucp XF:default-unix-root XF:default-unix-toor XF:default-unix-tour XF:default-unix-tty XF:default-unix-uucp<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br> CHANGE> [Meunier changed vote from ACCEPT to RECAST]<br> Meunier> This relates only to account password technology, so this candidate is independent of the operating system, application, web site or other application of this technology. The appropriate (natural) level of abstraction is therefore without specifying that it is for UNIX. Change the description to "An account has a guessable password other than default, null, blank." This should satisfy Andre's objection. This Candidate should be merged with any candidate relating to account password technology where "Unix" in the original description can be replaced by something else.<br>
A Unix account has a default, null, blank, or missing password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:passwd-blank XF:no-pass XF:dict XF:sgi-accounts XF:linux-caldera-lisa<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br>
A Windows NT local user or administrator account has a guessable password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Note: I am assuming that this entry includes Windows 2000 accounts and machine/service accounts listed in User Manager. XF:nt-guess-admin XF:nt-guess-user XF:nt-guess-guest XF:nt-guessed-operpwd XF:nt-guessed-powerwd XF:nt-guessed-disabled XF:nt-guessed-backup XF:nt-guessed-acctoper-pwd XF:nt-adminuserpw XF:nt-guestuserpw XF:nt-accountuserpw XF:nt-operator-userpw XF:nt-service-user-pwd XF:nt-server-oper-user-pwd XF:nt-power-user-pwd XF:nt-backup-operator-userpwd XF:nt-disabled-account-userpwd<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br>
A Windows NT local user or administrator account has a default, null, blank, or missing password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:nt-guestblankpw XF:nt-adminblankpw XF:nt-adminnopw XF:nt-usernopw XF:nt-guestnopw XF:nt-accountblankpw XF:nt-nopw XF:nt-operator-blankpwd XF:nt-server-oper-blank-pwd XF:nt-power-user-blankpwd XF:nt-backup-operator-blankpwd XF:nt-disabled-account-blankpwd<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br>
A Windows NT domain user or administrator account has a guessable password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:nt-guessed-domain-userpwd XF:nt-guessed-domain-guestpwd XF:nt-guessed-domain-adminpwd XF:nt-domain-userpwd XF:nt-domain-admin-userpwd XF:nt-domain-guest-userpwd XF:win2k-certpub-usrpwd XF:win2k-dhcpadm-usrpwd XF:win2k-dnsadm-usrpwd XF:win2k-entadm-usrpwd XF:win2k-schema-usrpwd XF:win2k-guessed-certpub XF:win2k-guessed-dhcpadm XF:win2k-guessed-dnsadm XF:win2k-guessed-entadm XF:win2k-guessed-schema<br>
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:nt-domain-admin-blankpwd XF:nt-domain-admin-nopwd XF:nt-domain-guest-blankpwd XF:nt-domain-guest-nopwd XF:nt-domain-user-blankpwd XF:nt-domain-user-nopwd XF:win2k-certpub-blnkpwd XF:win2k-dhcpadm-blnkpwd XF:win2k-dnsadm-blnkpwd XF:win2k-entadm-blnkpwd XF:win2k-schema-blnkpwd<br>
An account on a router, firewall, or other network device has a guessable password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:firewall-tisopen XF:firewall-raptoropen XF:firewall-msopen XF:firewall-checkpointopen XF:firewall-ciscoopen<br>
An account on a router, firewall, or other network device has a default, null, blank, or missing password.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> Note: Because the distinction between network hardware and software is not distinct, the term 'network device' was liberally interpreted. Feel free to reject any of the below terms. XF:default-netranger XF:cayman-gatorbox XF:breezecom-default-passwords XF:default-portmaster XF:wingate-unpassworded XF:netopia-unpassworded XF:default-bay-switches XF:motorola-cable-default-pass XF:default-flowpoint XF:qms-2060-no-root-password XF:avirt-ras-password XF:webtrends-rtp-serv-install-password XF:cisco-bruteforce XF:cisco-bruteadmin XF:sambar-server-defaults XF:management-pfcuser XF:http-cgi-wwwboard-default<br> Christey> DELREF XF:avirt-ras-password - does not fit CVE-1999-0508.<br>
Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.
Status:CandidateACCEPT(2) Northcutt, Wall<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> What is the right level of abstraction to use here? Should we combine all possible interpreters into a single entry, or have a different entry for each one? I've often seen Perl separated from other interpreters - is it included by default in some Windows web server configurations?<br> Christey> Add tcsh, zsh, bash, rksh, ksh, ash, to support search.<br> Frech> XF:http-cgi-vuln(146)<br>
A router or firewall allows source routed packets from arbitrary hosts.
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:source-routing<br>
IP forwarding is enabled on a machine which is not a router or firewall.
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:ip-forwarding<br>
A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.
Status:CandidateACCEPT(3) Baker, Northcutt, Shostack<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:smtp-sendmail-relay(210) XF:ntmail-relay(2257) XF:exchange-relay(3107) (also assigned to CVE-1999-0682) XF:smtp-relay-uucp(3470) XF:sco-sendmail-spam(4342) XF:sco-openserver-mmdf-spam(4343) XF:lotus-domino-smtp-mail-relay(6591) XF:win2k-smtp-mail-relay(6803) XF:cobalt-poprelayd-mail-relay(6806) Candidate implicitly may refer to relaying settings enabled by default, or the bypass/circumvention of relaying. Both interpretations were used in assigning this candidate.<br> Christey> The intention of this candidate is to cover configurations in which the admin has explicitly enabled relaying. Other cases in which the application *intends* to prvent relaying, but there is some specific input that bypasses/tricks it, count as vulnerabilities (or exposures?) and as such would be assigned different numbers. http://www.sendmail.org/~ca/email/spam.html seems like a good general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt<br> Christey> I changed the description to make it more clear that the issue is that of explicit configuration, as opposed to being the result of a vulnerability.<br>
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
Status:EntryUDP messages to broadcast addresses are allowed, allowing for a Fraggle attack that can cause a denial of service by flooding the target.
Status:EntryAn unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(1) Frech<br> REJECT(1) Shostack<br>Voter Comments:
Shostack> Overly broad<br> Frech> XF:rsh-equiv(111)<br> Baker> Since this is unrestricted trust, I agree this is a problem<br>
An SNMP community name is guessable.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:snmp-get-guess XF:snmp-set-guess XF:sol-hidden-commstr XF:hpov-hidden-snmp-comm<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br>
An SNMP community name is the default (e.g. public), null, or missing.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:nt-snmp XF:snmp-comm XF:snmp-set-any XF:snmp-get-public XF:snmp-set-public XF:snmp-get-any<br> Christey> This candidate is affected by the CD:CF-PASS content decision, which determines the appropriate level of abstraction to use for password problems. CD:CF-PASS needs to be accepted by the Editorial Board before this candidate can be converted into a CVE entry; the final version of CD:CF-PASS may require using a different LOA than this candidate is currently using.<br> Christey> Consider adding BID:2112<br>
A NETBIOS/SMB share password is guessable.
Status:CandidateACCEPT(5) Baker, LeBlanc, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> Change description term to NetBIOS. XF:nt-netbios-perm XF:sharepass XF:win95-smb-password XF:nt-netbios-dict<br>
A NETBIOS/SMB share password is the default, null, or missing.
Status:CandidateACCEPT(5) Baker, LeBlanc, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> Change description term to NetBIOS. XF:decod-smb-password-empty XF:nt-netbios-everyoneaccess XF:nt-netbios-guestaccess XF:nt-netbios-allaccess XF:nt-netbios-open XF:nt-netbios-write XF:nt-netbios-shareguest XF:nt-writable-netbios XF:nt-netbios-everyoneaccess-printer XF:nt-netbios-share-print-guest<br>
A system-critical NETBIOS/SMB share has inappropriate access control.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br> REJECT(1) LeBlanc<br> REVIEWING(1) Christey<br>Voter Comments:
Northcutt> I think we need to enumerate the shares and or the access control<br> Christey> One question is, what is "inappropriate"? It's probably very dependent on the policy of the enterprise on which this is found. And should writable shares be different from readable shares? (Or file systems, mail spools, etc.) Yes, the impact may be different, but we could have a large number of entries for each possible type of access. A content decision (CD:CF-DATA) needs to be reviewed and accepted by the Editorial Board in order to resolve this question.<br> LeBlanc> Unacceptably vague - agree with Christey's comments.<br> Frech> associated to: XF:nt-netbios-everyoneaccess(1) XF:nt-netbios-guestaccess(2) XF:nt-netbios-allaccess(3) XF:nt-netbios-open(15) XF:nt-netbios-write(19) XF:nt-netbios-shareguest(20) XF:nt-writable-netbios(26) XF:nb-rootshare(393) XF:decod-smb-password-empty(2358)<br>
An NIS domain name is easily guessable.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:nis-dom<br> Christey> Consider http://www.cert.org/advisories/CA-1992-13.html as well as ftp://ciac.llnl.gov/pub/ciac/bulletin/c-fy92/c-25.ciac-sunos-nis-patch<br>
The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate.
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> Why not say world readable, this is what you do further down in the file (world exportable in CVE-1999-0554)<br> Christey> ADDREF AUSCERT:AA-96.02<br>
ICMP echo (ping) is allowed from arbitrary hosts.
Status:CandidateMODIFY(1) Meunier<br> NOOP(1) Baker<br> REJECT(2) Frech, Northcutt<br>Voter Comments:
Northcutt> (Though I sympathize with this one :)<br> CHANGE> [Frech changed vote from REVIEWING to REJECT]<br> Frech> Ping is a utility that can be run on demand; ICMP echo is a message type. As currently worded, this candidate seems as if an arbitrary host is vulnerable because it is capable of running an arbitrary program or function (in this case, ping/ICMP echo). There are many programs/functions that 'shouldn't' be on a computer, from a security admin's perspective. Even if this were a vulnerability, it would be impacted by CD-HIGHCARD.<br> Meunier> Every ICMP message type presents a vulnerability or an exposure, if access is not controlled. By that I mean not only those in RFC 792, but also those in RFC 1256, 950, and more. I think that the description should be changed to "ICMP messages are acted upon without any access control". ICMP is an error and debugging protocol. We complain about vendors leaving testing backdoors in their programs. ICMP is the equivalent for TCP/IP. ICMP should be in the dog house, unless you are trying to troubleshoot something. MTU discovery is just a performance tweak -- it's not necessary. I don't know of any ICMP message type that is necessary if the network is functional. Limited logging of ICMP messages could be useful, but acting upon them and allowing the modification of routing tables, the behavior of the TCP/IP stack, etc... without any form of authentication is just crazy.<br>
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Status:CandidateMODIFY(3) Baker, Frech, Meunier<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> XF:icmp-timestamp XF:icmp-netmask<br> Meunier> If this is not merged with 1999-0523 as I commented for that CVE, then the description should be changed to "ICMP messages of types 13 and 14 (timestamp request and reply) and 17 and 18 (netmask request and reply) are acted upon without any access control". It's a more precise and correct language. I believe that this is a valid CVE entry (it's a common source of vulnerabilities or exposures) even though I see that the inferred action was "reject". Knowing the time of a host also allows attacks against random number generators that are seeded with the current time. I want to push to have it accepted.<br> Baker> I agree with the description changes suggested by Pascal<br>
IP traceroute is allowed from arbitrary hosts.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> XF:traceroute<br>
An X server's access control is disabled (e.g. through an "xhost +" command) and allows anyone to connect to the server.
Status:EntryThe permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.
Status:CandidateACCEPT(3) Baker, Northcutt, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Northcutt> That that starts to get specific :)<br> Frech> ftp-writable-directory(6253) ftp-write(53) "writeable" in the description should be "writable." <br>
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.
Status:CandidateACCEPT(3) Baker, Meunier, Northcutt<br> MODIFY(1) Frech<br>Voter Comments:
Frech> possibly XF:nisd-dns-fwd-check<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:firewall-external-packet-forwarding(8372)<br>
A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.
Status:CandidateACCEPT(1) Frech<br> MODIFY(2) Baker, Meunier<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> I have seen ISPs "assign" private addresses within their domain<br> Meunier> A border router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc, outside of their area of validity.<br> CHANGE> [Frech changed vote from REVIEWING to ACCEPT]<br> Baker> I think the description should be modified to say they accept this type of traffic from an interface not residing on private/reserved network.<br>
A system is operating in "promiscuous" mode which allows it to perform packet sniffing.
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(1) Frech<br> REJECT(1) Shostack<br>Voter Comments:
Frech> XF:etherstatd(264) XF:sniffer-attack(778) XF:decod-packet-capture-remote(1072) XF:netmon-running(1448) XF:netxray3-probe(1450) XF:sol-snoop-getquota-bo(3670) (also assigned to CVE-1999-0974)<br> Baker> Does pose a problem in non-switched environments<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO."
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Christey<br> RECAST(1) Shostack<br> REJECT(1) Northcutt<br>Voter Comments:
Shostack> I think expn != vrfy, help, esmtp.<br> Frech> XF:lotus-domino-esmtp-bo(4499) (also assigned to CVE-2000-0452 and CVE-2000-1046) XF:smtp-expn(128) XF:smtp-vrfy(130) XF:smtp-helo-bo(886) XF:smtp-vrfy-bo(887) XF:smtp-expn-bo(888) XF:slmail-vrfyexpn-overflow(1721) XF:smtp-ehlo(323) Perhaps add RCPT? If so, add XF:smtp-rcpt(1928)<br> Christey> XF:smtp-vrfy(130) ?<br>
A DNS server allows zone transfers.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> (With split DNS implementations this is quite appropriate)<br> Frech> XF:dns-zonexfer<br>
A DNS server allows inverse queries.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> (rule of thumb)<br> Frech> XF:dns-iquery<br>
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
Status:CandidateACCEPT(5) Baker, Christey, Ozancin, Shostack, Wall<br> MODIFY(2) Frech, Northcutt<br>Voter Comments:
Northcutt> If we are going to write a laundry list put access to the scheduler in it.<br> Christey> The list of privileges is very useful for lookup.<br> Frech> XF:nt-create-token XF:nt-replace-token XF:nt-lock-memory XF:nt-increase-quota XF:nt-unsol-input XF:nt-act-system XF:nt-create-object XF:nt-sec-audit XF:nt-add-workstation XF:nt-manage-log XF:nt-take-owner XF:nt-load-driver XF:nt-profile-system XF:nt-system-time XF:nt-single-process XF:nt-increase-priority XF:nt-create-pagefile XF:nt-backup XF:nt-restore XF:nt-debug XF:nt-system-env XF:nt-remote-shutdown<br>
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
Status:CandidateACCEPT(2) Shostack, Wall<br> MODIFY(2) Baker, Frech<br> RECAST(2) Northcutt, Ozancin<br>Voter Comments:
Northcutt> inappropriate implies there is appropriate. As a guy who has been monitoring networks for years I have deep reservations about justiying the existance of any fixed cleartext password. For appropriate to exist, some "we" would have to establish some criteria for appropriate passwords.<br> Baker> Perhaps this could be re-worded a bit. The CVE CVE-1999-00582 specifies "...settings for lockouts". To remain consistent with the other, maybe it should specify "...settings for passwords" I think most people would agree that passwords should be at least 8 characters; contain letters (upper and lowercase), numbers and at least one non-alphanumeric; should only be good a limited time 30-90 days; and should not contain character combinations from user's prior 2 or 3 passwords. Suggested rewrite - A Windows NT account policy does not enforce reasonable minimum security-critical settings for passwords, e.g. passwords of sufficient length, periodic required password changes, or new password uniqueness<br> Ozancin> What is appropriate?<br> Frech> XF:nt-autologonpwd XF:nt-pwlen XF:nt-maxage XF:nt-minage XF:nt-pw-history XF:nt-user-pwnoexpire XF:nt-unknown-pwdfilter XF:nt-pwd-never-expire XF:nt-pwd-nochange XF:nt-pwdcache-enable XF:nt-guest-change-passwords<br>
A configuration in a web browser such as Internet Explorer or Netscape Navigator allows execution of active content such as ActiveX, Java, Javascript, etc.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Frech<br> REJECT(1) LeBlanc<br>Voter Comments:
Frech> Good candidate for dot notation. XF:nav-java-enabled XF:nav-javascript-enabled XF:ie-active-content XF:ie-active-download XF:ie-active-scripting XF:ie-activex-execution XF:ie-java-enabled XF:netscape-javascript XF:netscape-java XF:zone-active-scripting XF:zone-activex-execution XF:zone-desktop-install XF:zone-low-channel XF:zone-file-download XF:zone-file-launch XF:zone-java-scripting XF:zone-low-java XF:zone-safe-scripting XF:zone-unsafe-scripting<br> LeBlanc> Not a vulnerability. These are just checks for configuration settings that a user might have changed. I understand need to increase number of checks in a scanning product, but don't feel like these belong in CVE. Scanner vendors could argue that these entries are needed to keep a common language.<br> Baker> Not sure about whether we should bother to include this type issue or not. It does provide a stepping stone for further actions, but in and of itself it isn't a specific vulnerability.<br>
A trust relationship exists between two Unix hosts.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(2) Northcutt, Shostack<br>Voter Comments:
Northcutt> Too non specific<br> Frech> XF:trusted-host(341) XF:trust-remote-same(717) XF:trust-remote-root(718) XF:trust-remote-nonroot(719) XF:trust-remote-any(720) XF:trust-other-host(723) XF:trust-all-nonroot(726) XF:trust-any-remote(727) XF:trust-local-acct(728) XF:trust-local-any(729) XF:trust-local-nonroot(730) XF:trust-all-hosts(731) XF:nt-trusted-domain(1284) XF:rsagent-trusted-domainadded(1588) XF:trust-remote-user(2955) XF:user-trust-hosts(3074) XF:user-trust-other-host(3077) XF:user-trust-remote-account(3079)<br>
A password for accessing a WWW URL is guessable.
Status:CandidateACCEPT(4) Baker, Meunier, Northcutt, Shostack<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:http-password<br>
The Windows NT guest account is enabled.
Status:CandidateACCEPT(5) Baker, Northcutt, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:nt-guest-account<br>
An SSH server allows authentication through the .rhosts file.
Status:CandidateACCEPT(2) Baker, Shostack<br> MODIFY(1) Frech<br> NOOP(1) Northcutt<br>Voter Comments:
Frech> XF:sshd-rhosts(315)<br>
A superfluous NFS server is running, but it is not importing or exporting any file systems.
Status:CandidateACCEPT(1) Shostack<br> NOOP(1) Baker<br> REJECT(1) Northcutt<br>Voter Comments:
Windows NT automatically logs in an administrator upon rebooting.
Status:CandidateACCEPT(1) Hill<br> MODIFY(3) Blake, Frech, Ozancin<br> NOOP(1) Wall<br> REJECT(1) Baker<br>Voter Comments:
Wall> Don't know what this is. Don't think it is a vulnerability and would initially reject. This is different than just renaming the administrator account.<br> Frech> Would appreciate more information on this one, as in a reference.<br> Blake> Reference: XF:nt-autologin<br> Ozancin> Needs more detail<br> Baker> I tried to find the XF:nt-autologin reference, and got no matching records from their search engine. No refs, no details, should reject<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:nt-autologon(5)<br>
A router's routing tables can be obtained from arbitrary hosts.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> Don't you mean obtained by arbitrary hosts<br> Frech> XF:routed XF:decod-rip-entry XF:rip<br> Baker> Concur with this as a security issue<br>
HP OpenMail can be misconfigured to allow users to run arbitrary commands using malicious print requests.
Status:EntryNFS exports system-critical data to the world, e.g. / or a password file.
Status:CandidateACCEPT(2) Northcutt, Wall<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> A content decision (CD:CF-DATA) needs to be reviewed and accepted by the Editorial Board in order to resolve this question.<br>
A Unix account with a name other than "root" has UID 0, i.e. root privileges.
Status:CandidateNOOP(1) Baker<br> REJECT(2) Northcutt, Shostack<br>Voter Comments:
Northcutt> This is very bogus<br>
Two or more Unix accounts have the same UID.
Status:CandidateNOOP(2) Baker, Christey<br> REJECT(2) Northcutt, Shostack<br>Voter Comments:
Christey> XF:duplicate-uid(876)<br> Christey> Add terms "duplicate" and "user ID" to facilitate search. ftp://ftp.auscert.org.au/pub/auscert/papers/unix_security_checklist<br>
A system-critical Unix file or directory has inappropriate permissions.
Status:CandidateACCEPT(2) Baker, Wall<br> RECAST(2) Northcutt, Shostack<br>Voter Comments:
Northcutt> Writable other than by root/bin/wheelgroup?<br>
A system-critical Windows NT file or directory has inappropriate permissions.
Status:CandidateACCEPT(2) Baker, Wall<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> I think we should specify these<br>
IIS has the #exec function enabled for Server Side Include (SSI) files.
Status:CandidateNOOP(2) Baker, Northcutt<br> RECAST(1) Shostack<br> REJECT(1) LeBlanc<br>Voter Comments:
LeBlanc> Does not meet definition of a vulnerability. This function is just enabled. You can turn it off if you want. if you trust the people putting up your web pages, this isn't a problem. If you don't, this is just one of many things you need to change.<br>
The registry in Windows NT can be accessed remotely by users who are not administrators.
Status:CandidateACCEPT(4) Baker, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> This isn't all or nothing, users may be allowed to access part of the registry.<br> Frech> XF:nt-winreg-all XF:nt-winreg-net<br>
An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.
Status:CandidateACCEPT(2) Baker, Shostack<br> NOOP(1) Northcutt<br>Voter Comments:
A Sendmail alias allows input to be piped to a program.
Status:CandidateACCEPT(1) Northcutt<br> NOOP(1) Baker<br> RECAST(1) Shostack<br> REVIEWING(1) Christey<br>Voter Comments:
Shostack> Is this a default alias? Is my .procmailrc an instance of this?<br> Christey> It is not entirely clear whether the simple fact that an alias pipes into a program should be considered a vulnerability. It all depends on the behavior of that particular program. This is one of a number of configuration-related issues from the "draft" CVE that came from vulnerability scanners. In general, when we get to general configuration and "policy," it becomes more difficult to use the current CVE model to represent them. So at the very least, this candidate (and similar ones) should be given close consideration and discussion before being added to the official CVE list. Because this candidate is related to general configuration issues, and we have not completely determined how to handle such issues in CVE, this candidate cannot be promoted to an official CVE entry until such issues are resolved.<br>
An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.
Status:Entryrpc.admind in Solaris is not running in a secure mode.
Status:CandidateACCEPT(1) Northcutt<br> NOOP(2) Baker, Christey<br> RECAST(2) Dik, Shostack<br>Voter Comments:
Shostack> are there secure modes?<br> Dik> Several: 1) there is no "rpc.admind" daemon. there used to be a "admind" RPC daemon (100087/10) and there's now an "sadmind" daemon (100232/10) The switch over was somewhere around Solaris 2.4. 2) Neither defaults to "secure mode" 3) secure mode is "using secure RPC" which does proper over the wire authentication by specifying the "-S 2" option in inetd.conf (security level 2)<br> Christey> XF:rpc-admind(626) http://xforce.iss.net/static/626.php MISC:http://pulhas.org/xploitsdb/mUNIXes/admind.html<br>
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
Status:CandidateACCEPT(1) Wall<br> NOOP(2) Baker, Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> I do this intentionally somethings in high content directories<br> Christey> XF:http-noindex(90) ?<br>
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
Status:CandidateACCEPT(1) Northcutt<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Wall<br>Voter Comments:
Northcutt> Here we are crossing into the best practices arena again. However since passfilt does establish a measurable standard and since we aren't the ones defining the stanard, simply saying it should be employed I will vote for this. <br> Frech> XF:nt-passfilt-not-inst(1308) XF:nt-passfilt-not-found(1309)<br> Christey> Consider MSKB:Q161990 and MSKB:Q151082<br>
A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(2) Christey, Northcutt<br>Voter Comments:
CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:ascend-config-kill(889) XF:cisco-ios-crash(1238) XF:webramp-remote-access(1670) XF:ascom-timeplex-debug(1824) XF:netopia-unpassworded(1850) XF:cisco-web-crash(1886) XF:cisco-router-commands(1951) XF:motorola-cable-default-pass(2002) XF:default-flowpoint(2091) XF:netgear-router-idle-dos(4003) XF:cisco-cbos-telnet(4251) XF:routermate-snmp-community(4290) XF:cayman-router-dos(4479) XF:wavelink-authentication(5185) XF:ciscosecure-ldap-bypass-authentication(5274) XF:foundry-firmware-telnet-dos(5514) XF:netopia-view-system-log(5536) XF:cisco-webadmin-remote-dos(5595) XF:cisco-cbos-web-access(5626) XF:netopia-telnet-dos(6001) XF:cisco-sn-gain-access(6827) XF:cayman-dsl-insecure-permissions(6841) XF:linksys-etherfast-reveal-passwords(6949) XF:zyxel-router-default-password(6968) XF:cisco-cbos-web-config(7027) XF:prestige-wan-bypass-filter(7146)<br> Christey> I changed the description to make it more explicit that this candidate is about router configuration, as opposed to vulnerabilities that accidentally make a configuration service accessible to anyone.<br>
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Status:CandidateACCEPT(4) Baker, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br> NOOP(2) Christey, Northcutt<br>Voter Comments:
Northcutt> I don't quite get what this means, sorry<br> Frech> XF:nt-regfile(178)<br> Christey> MISC:http://security-archive.merton.ox.ac.uk/nt-security-199902/0087.html<br>
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
Status:CandidateACCEPT(4) Christey, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br> RECAST(2) Baker, Northcutt<br>Voter Comments:
Northcutt> It isn't a great truth that you should enable all or the above, if you do you potentially introduce a vulnerbility of filling up the file system with stuff you will never look at.<br> Ozancin> It is far less interesting what a user does successfully that what they attempt and fail at.<br> Christey> The list of event types is very useful for lookup.<br> Frech> XF:nt-system-audit XF:nt-logon-audit XF:nt-object-audit XF:nt-privil-audit XF:nt-process-audit XF:nt-policy-audit XF:nt-account-audit<br> CHANGE> [Baker changed vote from REVIEWING to RECAST]<br>
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
Status:CandidateACCEPT(3) Baker, Shostack, Wall<br> MODIFY(2) Frech, Ozancin<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> 1.) Too general are we ready to state what the security-critical files and directories are 2.) Does Ataris, Windows CE, PalmOS, Linux have such a capability<br> Ozancin> Some files and directories are clearly understood to be critical. Others are unclear. We need to clarify that critical is.<br> Frech> XF:nt-object-audit<br>
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
Status:CandidateACCEPT(2) Shostack, Wall<br> MODIFY(3) Baker, Frech, Ozancin<br> REJECT(1) Northcutt<br>Voter Comments:
Ozancin> It is far less interesting what a user does successfully that what they attempt and fail at. Perhaps only failure should be logged.<br> Frech> XF:nt-object-audit<br> CHANGE> [Baker changed vote from REVIEWING to MODIFY]<br> Baker> Failure on non-critical files is what should be monitored.<br>
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
Status:CandidateACCEPT(4) Baker, Ozancin, Shostack, Wall<br> MODIFY(1) Frech<br> REJECT(1) Northcutt<br>Voter Comments:
Ozancin> with reservation Again what is defined as critical<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:nt-object-audit(228)<br>
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
Status:CandidateACCEPT(3) Baker, Shostack, Wall<br> MODIFY(2) Frech, Ozancin<br> REJECT(1) Northcutt<br>Voter Comments:
Ozancin> Again only failure may be of interest. It would be impractical to wad through the incredibly large amount of logging that this would generate. It could overwhelm log entries that you might find interesting.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:nt-object-audit(228)<br>
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Baker> This is way vague...<br>
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Baker> way too vague<br>
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
Status:CandidateACCEPT(3) Ozancin, Shostack, Wall<br> MODIFY(2) Baker, Frech<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> The definition is?<br> Baker> Maybe a rewording of this one too. I think most people would agree on some "minimum" policies like 3-5 bad attempts lockout for an hour or until the administrator unlocks the account. Suggested rewrite - A Windows NT account policy does not enforce reasonable minimum security-critical settings for lockouts, e.g. lockout duration, lockout after bad logon attempts, etc.<br> Ozancin> with reservations What is appropriate?<br> Frech> XF:nt-thres-lockout XF:nt-lock-duration XF:nt-lock-window XF:nt-perm-lockout XF:lockout-disabled<br>
There is a one-way or two-way trust relationship between Windows NT domains.
Status:CandidateNOOP(2) Baker, Christey<br> REJECT(2) Northcutt, Shostack<br>Voter Comments:
Christey> XF:nt-trusted-domain(1284)<br>
A Windows NT file system is not NTFS.
Status:CandidateACCEPT(2) Northcutt, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br>Voter Comments:
Wall> NTFS partition provides the security. This could be re-worded to "A Windows NT file system is FAT" since it is either NTFS or FAT and FAT is less secure.<br> Frech> XF:nt-filesys(195)<br> Christey> MSKB:Q214579 MSKB:Q214579 http://support.microsoft.com/support/kb/articles/Q100/1/08.ASP<br>
A Windows NT administrator account has the default name of Administrator.
Status:CandidateACCEPT(1) Ozancin<br> MODIFY(1) Frech<br> REJECT(3) Baker, Northcutt, Shostack<br> REVIEWING(1) Wall<br>Voter Comments:
Wall> Some sources say this is not a vulnerability, but a warning. It just slows down the search for the admin account (SID = 500) which can always be found.<br> Northcutt> I change this on all NT systems I am responsible for, but is root a vulnerability?<br> Baker> There are ways to identify the administrator account anyway, so this is only a minor delay to someone that is knowledgeable. This, in and of itself, doesn't really strike me as a vulnerability, anymore than the root account on a Unix box.<br> Shostack> (there is no way to hide the account name today)<br> Frech> XF:nt-adminexists<br>
A network service is running on a nonstandard port.
Status:CandidateNOOP(1) Baker<br> RECAST(1) Shostack<br> REJECT(1) Northcutt<br>Voter Comments:
Shostack> Might be acceptable if clearer; is that a standard service on a non-standard port, or any service on an unassigned port?<br> Baker> It might actually be an enhancement rather than a problem to run a service on a non-standard port<br>
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> While I would accept this for Unix, I am not sure this applies to NT, VMS, palm pilots, or commodore 64<br>
A filter in a router or firewall allows unusual fragmented packets.
Status:CandidateMODIFY(2) Baker, Frech<br> REJECT(1) Northcutt<br>Voter Comments:
Northcutt> I want to vote to accept this one, but unusual is a shade broad.<br> Frech> XF:nt-rras XF:cisco-fragmented-attacks XF:ip-frag<br> Baker> Perhaps we should use the word abnormally fragmented or some other descriptor.<br>
A system-critical Windows NT registry key has inappropriate permissions.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(2) Christey, Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Christey> Upon further reflection, this is too high-level for CVE. Specific registry keys with bad permissions is roughly equivalent to Unix configuration files that have bad permissions; those permission problems can be created by any vendor, not just a specific one. Therefore this candidate should be RECAST into each separate registry key that has this problem.<br>
A system does not present an appropriate legal message or warning to a user who is accessing it.
Status:CandidateACCEPT(2) Baker, Northcutt<br> MODIFY(1) Christey<br> RECAST(1) Shostack<br>Voter Comments:
Christey> ADDREF CIAC:J-043 URL:http://ciac.llnl.gov/ciac/bulletins/j-043.shtml Also add "banner" to the description to facilitate search.<br> Baker> Should be in place where ever it is possible<br>
An event log in Windows NT has inappropriate access permissions.
Status:CandidateACCEPT(2) Baker, Wall<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> splain Lucy, splain<br>
The Logon box of a Windows NT system displays the name of the last user who logged in.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(2) Northcutt, Wall<br>Voter Comments:
Wall> Information gathering, not vulnerability<br> Northcutt> Ah a C2 weenie must have snuck this in, this can be a good thing not just vulnerability<br> Frech> XF:nt-display-last-username(1353) Use it if you will. :-) If not, let us know so I can remove the CAN reference from our database.<br> Christey> MSKB:Q114463 http://support.microsoft.com/support/kb/articles/q114/4/63.asp<br>
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Northcutt<br>Voter Comments:
Wall> Still a denial of service.<br> Northcutt> May well be appropriate<br> Frech> XF:nt-shutdown-without-logon(1291)<br>
A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Wall> Perhaps it can be re-worded to "removable media drives such as a floppy disk drive or CDROM drive can be accessed (shared) in a Windows NT system."<br> Northcutt> - what good is my NT w/o its floppy<br> Frech> XF:nt-allocate-cdroms(1294) XF:nt-allocate-floppy(1318)<br> Christey> MSKB:Q172520 URL:http://support.microsoft.com/support/kb/articles/q172/5/20.asp<br>
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
Status:CandidateACCEPT(2) Baker, Wall<br> MODIFY(1) Frech<br> NOOP(1) Northcutt<br>Voter Comments:
Frech> XF:nt-clearpage(216) XF:reg-pagefile-clearing(2551)<br>
A Windows NT log file has an inappropriate maximum size or retention period.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(2) Northcutt, Wall<br>Voter Comments:
Northcutt> define appropriate<br> Frech> XF:reg-app-log-small(2521) XF:reg-sec-log-maxsize(2577) XF:reg-sys-log-small(2586)<br>
A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.
Status:CandidateACCEPT(1) Northcutt<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(1) Wall<br>Voter Comments:
Frech> XF:nt-forced-logoff(1343)<br>
A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection.
Status:CandidateACCEPT(3) Armstrong, Baker, Northcutt<br> NOOP(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Waiting for CIEL.<br> Christey> This is a design flaw, along with the other reported IDS problems; at least reference Ptacek/Newsham's paper.<br> Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html<br>
A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers.
Status:CandidateACCEPT(2) Baker, Northcutt<br> NOOP(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Waiting for CIEL.<br> Christey> This is a design flaw, along with the other reported IDS problems; at least reference Ptacek/Newsham's paper.<br> Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html<br>
A network intrusion detection system (IDS) does not verify the checksum on a packet.
Status:CandidateACCEPT(2) Baker, Northcutt<br> NOOP(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Waiting for CIEL.<br> Christey> This is a design flaw, along with the other reported IDS problems; at least reference Ptacek/Newsham's paper.<br> Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html<br>
A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets.
Status:CandidateACCEPT(2) Baker, Northcutt<br> NOOP(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Waiting for Godot, er, CIEL.<br> Christey> This is a design flaw, along with the other reported IDS problems; at least reference Ptacek/Newsham's paper.<br> Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html<br>
A network intrusion detection system (IDS) does not properly reassemble fragmented packets.
Status:CandidateACCEPT(2) Baker, Northcutt<br> NOOP(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Waiting for CIEL.<br> Christey> This is a design flaw, along with the other reported IDS problems; at least reference Ptacek/Newsham's paper.<br> Christey> URL:http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html<br>
In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc.
Status:CandidateMODIFY(1) Frech<br> NOOP(1) Baker<br> REJECT(2) Northcutt, Wall<br>Voter Comments:
Frech> XF:nt-system-operator XF:nt-admin-group XF:nt-replicator XF:nt-print-operator XF:nt-power-user XF:nt-guest-in-group XF:nt-backup-operator XF:nt-domain-admin XF:nt-domain-guest XF:win2k-acct-oper-grp XF:win2k-admin-grp XF:win2k-backup-oper-grp XF:win2k-certpublishers-grp XF:win2k-dhcp-admin-grp XF:win2k-dnsadm-grp XF:win2k-domainadm-grp XF:win2k-entadm-grp XF:win2k-printoper-grp XF:win2k-replicator-grp XF:win2k-schemaadm-grp XF:win2k-serveroper-grp You asked for it... :-) Use or reject at your discretion. If rejected, please let us know so we can remove CAN references from database.<br>
An incorrect configuration of the WebStore 1.0 shopping cart CGI program "web_store.cgi" could disclose private information.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br>Voter Comments:
Frech> XF:webstore-misconfig(3861)<br>
An incorrect configuration of the Order Form 1.0 shopping cart CGI program could disclose private information.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Christey, Northcutt, Wall<br>Voter Comments:
Frech> XF:orderform-misconfig(3860)<br> Christey> BID:2021<br> Christey> Mention affected files: order_log_v12.dat and order_log.dat fix version number (1.2)<br>
An incorrect configuration of the EZMall 2000 shopping cart CGI program "mall2000.cgi" could disclose private information.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Christey, Northcutt, Wall<br>Voter Comments:
Frech> XF:ezmall2000-misconfig(3859)<br> Christey> Add mall_log_files/order.log to desc<br>
quikstore.cgi in QuikStore shopping cart stores quikstore.cfg under the web document root with insufficient access control, which allows remote attackers to obtain the cleartext administrator password and gain privileges.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Christey, Northcutt, Wall<br>Voter Comments:
Frech> XF:quikstore-misconfig(3858)<br> Christey> http://www.quikstore.com/help/pages/Security/security.htm says: "It is IMPORTANT that during the setup of the QuikStore program, you check to make sure that the cgi-bin or executable program directory of your web site not be viewable from the outside world. You don't want the users to have access to your programs or log files that could be stored there! ... If you can view or download these files from the browser, someone else can too" So is this a configuration problem? See the configuration file at http://www.quikstore.com/help/pages/Configuration/configparametersfull.htm The [DIRECTORY_PATHS] section identifies pathnames and describes how pathnames are constructed. It clearly uses relative pathnames, so all data is underneath the base directory!! If we call this a configuration problem, then maybe this (and all other "CGI-data-in-web-tree" configuration problems) should be combined.<br> Christey> Consider adding BID:1983<br>
An incorrect configuration of the PDG Shopping Cart CGI program "shopper.cgi" could disclose private information.
Status:EntryAn incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(3) Christey, Northcutt, Wall<br>Voter Comments:
Frech> XF:softcart-misconfig(3856)<br> Christey> Consider adding BID:2055<br>
An incorrect configuration of the Webcart CGI program could disclose private information.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(2) Northcutt, Wall<br>Voter Comments:
Frech> Cite reference as: BUGTRAQ:19990424 Re: Shopping Carts exposing CC data URL: http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist% 3D1%26date%3D2000-08-22%26msg%3D3720E2B6.6031A2E7@datashopper.dk<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:webcart-data-exposure(8374)<br>
A system-critical Windows NT registry key has an inappropriate value.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Baker> too vague<br>
A version of finger is running that exposes valid user information to any entity on the network.
Status:EntryThe rpc.sprayd service is running.
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> XF:sprayd<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running."
Status:CandidateACCEPT(3) Baker, Prosser, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Baker> Although newer versions on snmp are not as vulnerable as prior versions, this can still be a significant risk of exploitation, as seen in recent attacks on snmp services via automated worms<br> Christey> XF:snmp(132) ?<br> Prosser> This fits the "exposure" description although we also know there are many vulnerabilities in SNMP. This is more of a policy/best practice issue for administrators. If you need SNMP lock it down as tight as you can, if you don't need it, don't run it.<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The rexec service is running.
Status:CandidateACCEPT(4) Baker, Northcutt, Ozancin, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:decod-rexec XF:rexec<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running."
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> XF:ypserv(261)<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running."
Status:CandidateACCEPT(2) Baker, Wall<br> MODIFY(1) Frech<br> REJECT(2) LeBlanc, Northcutt<br>Voter Comments:
LeBlanc> There is insufficient description to even know what this is. Lots of component services related to NetBIOS run, and usually do not constitute a problem.<br> Frech> associated to: XF:nt-alerter(29) XF:nt-messenger(69) XF:reg-ras-gateway-enabled(2567)<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> Add "X11" to facilitate search.<br>
The rstat/rstatd service is running.
Status:CandidateACCEPT(3) Baker, Northcutt, Ozancin<br> MODIFY(1) Frech<br> NOOP(2) Meunier, Wall<br>Voter Comments:
Frech> XF:rstat-out XF:rstatd<br>
The rpc.rquotad service is running.
Status:CandidateACCEPT(3) Baker, Northcutt, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:rquotad<br>
A version of rusers is running that exposes valid user information to any entity on the network.
Status:EntryThe rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
Status:EntryThe rwho/rwhod service is running, which exposes machine status and user information.
Status:EntryThe ident/identd service is running.
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> possibly XF:identd?<br> Christey> XF:ident-users(318) ?<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:identd-vuln(61) XF:ident-users(318)<br>
The NT Alerter and Messenger services are running.
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> http://support.microsoft.com/support/kb/articles/q189/2/71.asp<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> XF:nfs-nfsd(76) ?<br> Christey> Add rpc.mountd/mountd to facilitate search.<br>
The RPC portmapper service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The echo service is running.
Status:CandidateACCEPT(3) Baker, Northcutt, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Northcutt> The method to my madness is echo is the common denom in the dos attack<br> Christey> How much of this is an overlap with the echo/chargen flood problem (CVE-1999-0103)? If this is only an exposure because of CVE-1999-0103, then maybe this should be REJECTed.<br>
The discard service is running.
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The systat service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The daytime service is running.
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The chargen service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> How much of this is an overlap with the echo/chargen flood problem (CVE-1999-0103)? If this is only an exposure because of CVE-1999-0103, then maybe this should be REJECTed.<br>
The Gopher service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The UUCP service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> XF:nntp-post(88) ?<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> XF:irc-server(767) ?<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running."
Status:CandidateACCEPT(2) Baker, Ozancin<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> XF:bootp<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running."
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The netstat service is running, which provides sensitive information to remote attackers.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The rsh/rlogin service is running.
Status:CandidateACCEPT(2) Baker, Wall<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Christey> aka "shell" on UNIX systems (at least Solaris) in the /etc/inetd.conf file.<br> Frech> associated to: XF:nt-rlogin(92) XF:rsh-svc(114) XF:rshd(2995)<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL."
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
Frech> XF:nt-sql-server(1289) XF:msql-detect(2211) XF:oracle-detect(2388) XF:sybase-detect-namedpipes(1461)<br>
A component service related to NIS+ is running.
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
The OS/2 or POSIX subsystem in NT is enabled.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Northcutt<br>Voter Comments:
Wall> These subsystems could still allow a process to persist across logins.<br> Frech> XF:nt-posix(217) XF:nt-posix-sub-c2(2397) XF:nt-posix-sub-onceonly(2478) XF:nt-os2-sub(218) XF:nt-os2-sub-c2(2396) XF:nt-os2-sub-onceonly(2477) XF:nt-os2-registry(2550)<br> Christey> s2-file-os2(1865)<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities."
Status:CandidateACCEPT(5) Baker, Frech, Northcutt, Ozancin, Wall<br>Voter Comments:
CHANGE> [Frech changed vote from REVIEWING to ACCEPT]<br>
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
WinGate is being used.
Status:CandidateACCEPT(1) Baker<br> NOOP(1) Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running."
Status:CandidateACCEPT(2) Baker, Wall<br> REJECT(1) Northcutt<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present."
Status:CandidateREJECT(3) Baker, Northcutt, Wall<br>Voter Comments:
Wall> Don't consider this a service or a problem.<br> Baker> concur with wall on this<br>
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc."
Status:CandidateACCEPT(4) Baker, Hill, Northcutt, Wall<br> NOOP(1) Christey<br>Voter Comments:
Christey> Add "back door" to description.<br>
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
Status:CandidateACCEPT(4) Baker, Hill, Northcutt, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Should add the specific CERT advisory references for well-known Trojaned software.<br> TCP Wrappers -> CERT:CA-1999-01 CERT:CA-1999-02 includes util-linux wuarchive - CERT:CA-94.07 IRC client - CERT:CA-1994-14<br> Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) Modify description to use dot notation.<br> Christey> CERT:CA-2002-24 URL:http://www.cert.org/advisories/CA-2002-24.html XF:openssh-backdoor(9763) URL:http://www.iss.net/security_center/static/9763.php BID:5374 URL:http://www.securityfocus.com/bid/5374<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> Add libpcap and tcpdump: BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 CERT:CA-2002-30 URL:http://www.cert.org/advisories/CA-2002-30.html This CAN has been active for over 4 years. At this moment, my thinking is that we should SPLIT this CAN into each separate trojaned product, then create some criteria that restrict creation of new CANs to "widespread" or "important" products only.<br>
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
Status:CandidateACCEPT(4) Baker, Hill, Northcutt, Wall<br>Voter Comments:
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
Status:CandidateACCEPT(3) Baker, Hill, Wall<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> This needs to be worded carefully. 1. Rootkits evade checksum detection. 2. The modification could be positive (a patch)<br>
An application-critical Windows NT registry key has inappropriate permissions.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(2) Christey, Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Christey> Upon further reflection, this is too high-level for CVE. Specific registry keys with bad permissions is roughly equivalent to Unix configuration files that have bad permissions; those permission problems can be created by any vendor, not just a specific one. Therefore this candidate should be RECAST into each separate registry key that has this problem.<br>
An application-critical Windows NT registry key has an inappropriate value.
Status:CandidateACCEPT(1) Wall<br> NOOP(1) Baker<br> RECAST(1) Northcutt<br>Voter Comments:
Northcutt> I think we can define appropriate, take a look at the nt security .pdf and see if you can't see a way to phrase specific keys in a way that defines inappropriate.<br> Baker> very vague<br>
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
Status:CandidateACCEPT(2) Blake, Cole<br> MODIFY(1) Stracener<br> NOOP(2) Baker, Christey<br> REJECT(1) Frech<br>Voter Comments:
Stracener> Add Ref: BUGTRAQ:19970919 Playing redir games with ARP and ICMP<br> Frech> Cannot proceed without a reference. Too vague, and resembles XF:netbsd-arp: CVE-1999-0763: NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network. CVE-1999-0764: NetBSD allows ARP packets to overwrite static ARP entries. Will reconsider if reference provides enough information to render a distinction.<br> Christey> This particular vulnerability was exploited by an attacker during the ID'Net IDS test network exercise at the SANS Network Security '99 conference. The attacker adapted a publicly available program that was able to spoof another machine on the same physical network. See http://marc.theaimsgroup.com/?l=bugtraq&m=87602880019797&w=2 for the Bugtraq reference that Tom Stracener suggested. This generated a long thread on Bugtraq in 1997.<br> Blake> I'll second Tom's request to add the reference, it's a very posting good and the vulnerability is clearly derivative of the work. (I do recall talking to the guy and drafting a description.)<br>
The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
Status:EntryThe Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
Status:CandidateACCEPT(5) Baker, Cole, Ozancin, Prosser, Wall<br> MODIFY(2) Frech, Stracener<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:ms-scriptlet-eyedog-unsafe<br> Stracener> Add Ref: MSKB Q240308<br> Christey> Should CVE-1999-0669 and 668 be merged? If not, then this is a reason for not merging CVE-1999-0988 and CVE-1999-0828.<br>
Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
Status:CandidateACCEPT(3) Ozancin, Prosser, Wall<br> MODIFY(2) Frech, Stracener<br> REJECT(2) Baker, Cole<br>Voter Comments:
Frech> XF:ie-eyedog-bo<br> Cole> Based on the references and information listed this is the same as CVE-1999-0669<br> Stracener> Add Ref: MSKB Q240308<br> Baker> Duplicate<br>
Buffer overflow in ToxSoft NextFTP client through CWD command.
Status:EntryBuffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
Status:EntryBuffer overflow in ALMail32 POP3 client via From: or To: headers.
Status:CandidateACCEPT(6) Baker, Blake, Cole, Collins, Levy, Wall<br> MODIFY(2) Frech, Stracener<br> NOOP(3) Armstrong, Landfield, Oliver<br> REVIEWING(1) Ozancin<br>Voter Comments:
Stracener> AddRef: ShadowPenguinSecurity:PenguinToolbox,No.037<br> Frech> XF:almail-bo<br> CHANGE> [Cole changed vote from NOOP to ACCEPT]<br>
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
Status:EntryCheck Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.
Status:Entrysdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack.
Status:EntryThe WebRamp web administration utility has a default password.
Status:CandidateACCEPT(3) Baker, Blake, Stracener<br> MODIFY(2) Cole, Frech<br> NOOP(2) Armstrong, Christey<br>Voter Comments:
Cole> I would add that is is not forced to be changed.<br> Frech> XF:webramp-default-password<br> Christey> This problem may have been detected in January 1999: BUGTRAQ:19990121 Re: WebRamp M3 remote network access bug http://marc.theaimsgroup.com/?l=bugtraq&m=91702375402055&w=2<br>
A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
Status:EntryBuffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option.
Status:EntryWindows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.
Status:EntryBuffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
Status:EntryMicrosoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
Status:EntryDenial of service in Gauntlet Firewall via a malformed ICMP packet.
Status:EntryDenial of service in Sendmail 8.8.6 in HPUX.
Status:CandidateACCEPT(2) Blake, Cole<br> MODIFY(3) Frech, Prosser, Stracener<br> NOOP(1) Baker<br> REJECT(1) Christey<br>Voter Comments:
Stracener> Add Ref: CIAC: J-040<br> Prosser> Might change description to indicate DoS caused by multiple connections<br> Christey> Andre's right. This is a duplicate of CVE-1999-0684.<br> Frech> Without further information and/or references, this issue looks like an ambiguous version of CVE-1999-0478: Denial of service in HP-UX sendmail 8.8.6 related to accepting connections. (was REJECT) XF:hp-sendmail-connect-dos<br>
Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option.
Status:EntryDenial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL.
Status:EntryThe ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
Status:EntryBuffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
Status:EntryThe CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
Status:EntryHP CDE program includes the current directory in root's PATH variable.
Status:EntryBuffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Status:EntryThe default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Status:EntryBuffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
Status:EntryDenial of service in AIX ptrace system call allows local users to crash the system.
Status:EntryThe Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
Status:EntryBuffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
Status:EntrySCO Doctor allows local users to gain root privileges through a Tools option.
Status:EntryDenial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
Status:CandidateACCEPT(6) Armstrong, Baker, Blake, Cole, Collins, Ozancin<br> MODIFY(1) Frech<br> NOOP(4) Landfield, Levy, Stracener, Wall<br> REJECT(1) Christey<br>Voter Comments:
Stracener> Is the candidate referring to the denial of service problem mentioned in the changelogs for versions previous to 1.4.3-1 or does it pertain to some problem with or 1.4.8-1?<br> Frech> Depending on the version, this could be any number of DoSes related to ippl. From http://www.larve.net/ippl/: 9 April 1999: version 1.4.3 released, correctly fixing a potential denial of service attack. 7 April 1999: version 1.4.2 released, fixing a potential denial of service attack. XF:linux-ippl-dos<br> Christey> Changelog: http://pltplp.net/ippl/docs/HISTORY See comments for version 1.4.2 and 1.4.3 Another source: http://freshmeat.net/news/1999/04/08/923586598.html<br> CHANGE> [Stracener changed vote from REVIEWING to NOOP]<br> CHANGE> [Christey changed vote from NOOP to REJECT]<br> Christey> As mentioned by others, this could apply to several different versions. Since the description is too vague, this CAN should be REJECTED and recast into other candidates.<br>
The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
Status:EntryBuffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
Status:EntryAfter an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Status:EntryInternet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Status:EntryOpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.
Status:EntryBuffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Status:EntryBuffer overflow in INN inews program.
Status:EntryLinux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Status:EntryThe default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
Status:EntryBuffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
Status:EntryThe Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
Status:EntryThe oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root.
Status:EntryA vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
Status:CandidateACCEPT(4) Baker, Cole, Frech, Stracener<br> MODIFY(1) Blake<br> NOOP(1) Armstrong<br> REVIEWING(1) Christey<br>Voter Comments:
Blake> This obscurely-written advisory seems to state that COAS will make the file world-readable, not that it allows the user to make it so. I hardly think that allowing the user to turn off security is a vulnerability.<br> Christey> It's difficult to write the description based on what's in the advisory. If COAS inadvertently changes permissions without user confirmation, then it should be ACCEPTed with appropriate modification to the description.<br> Christey> ADDREF BID:137<br> CHANGE> [Armstrong changed vote from REVIEWING to NOOP]<br>
The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
Status:EntryVulnerability in Compaq Tru64 UNIX edauth command.
Status:EntryBuffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
Status:EntryBuffer overflow in Windows NT 4.0 help file utility via a malformed help file.
Status:EntryA remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
Status:EntryIBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
Status:EntryThe Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.
Status:EntryThe pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users.
Status:EntryDenial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
Status:EntryThe default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages.
Status:EntryThe Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input.
Status:EntryBuffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function.
Status:EntryWhen IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".
Status:EntryAn attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header.
Status:EntryA kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted.
Status:EntryA Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
Status:EntryBuffer overflow in Lotus Notes LDAP (NLDAP) allows an attacker to conduct a denial of service through the ldap_search request.
Status:EntryThe zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack.
Status:EntryThe KDE klock program allows local users to unlock a session using malformed input.
Status:EntryThe logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links.
Status:EntryBuffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable.
Status:EntryA default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication.
Status:EntryKDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.
Status:EntryThe showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(4) Ozancin, Prosser, Stracener, Wall<br> MODIFY(2) Cole, Frech<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:iis-samples-showcode<br> Cole> There are several sample files that allow this. I would quote showcode.asp but make it more generic.<br> Prosser> (Modify) Have a question on this and on the following three candidates as well. All of these are part of the file viewers utilities that allow unauthorized files reading, but MSKB Q231368 also mentioned the diagnostics program,Winmsdp.exe, as another vulnerable viewer in this same set of viewers. If we are going to split out the seperate viewer tools then shouldn't there should be a seperate CAN for Winmsdp.exe also.<br> Christey> Mike's question basically touches on the CD:SF-EXEC content decision - what do you do when you have the same bug in multiple executables? CD:SF-EXEC needs to be reviewed and approved by the Editorial Board before we can decide what to do with this candidate.<br> Christey> Mark Burnett says that Microsoft's mention of winmsdp.exe in MSKB:Q231368 may be an error, and that winmsdp.exe is a Microsoft Diagnostics Report Generator which may not even be installed as part of IIS. Also see http://www.securityfocus.com/focus/microsoft/iis/showcode.html<br> Christey> ADDREF BID:167 URL:http://www.securityfocus.com/vdb/bottom.html?vid=167<br> Christey> MISC:http://p.ulh.as/xploitsdb/NT/iis38.html covers a showcode.asp directory traversal vulnerability and refers to the L0pht advisory. Mark Burnett's article is at: MISC:http://www.securityfocus.com/infocus/1317<br>
The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(4) Ozancin, Prosser, Stracener, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Cole<br>Voter Comments:
Frech> XF:iis-samples-viewcode<br> Cole> I would combine this with the previous.<br> Prosser> (modify) See comments in 0736 above<br> Christey> See http://www.securityfocus.com/focus/microsoft/iis/showcode.html for additional details.<br> Christey> Mark Burnett's article is at: MISC:http://www.securityfocus.com/infocus/1317<br>
The code.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(4) Ozancin, Prosser, Stracener, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Cole<br>Voter Comments:
Frech> XF:iis-samples-code<br> Cole> Same as above<br> Prosser> (modify) See comments in 0736 above<br> Christey> See http://www.securityfocus.com/focus/microsoft/iis/showcode.html for additional details.<br> Christey> Mark Burnett's article is at: MISC:http://www.securityfocus.com/infocus/1317<br>
The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(4) Ozancin, Prosser, Stracener, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Cole<br>Voter Comments:
Frech> XF:iis-samples-codebrws<br> Cole> Same as above.<br> Prosser> (modify) See comments in 0736 above<br> Christey> codebrw2.asp and Codebrw1.asp also need to be included somewhere. Also see http://www.securityfocus.com/focus/microsoft/iis/showcode.html<br> Christey> Mark Burnett's article is at: MISC:http://www.securityfocus.com/infocus/1317<br>
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
Status:EntryQMS CrownNet Unix Utilities for 2060 allows root to log on without a password.
Status:CandidateACCEPT(4) Baker, Frech, Levy, Stracener<br> NOOP(2) Christey, Oliver<br>Voter Comments:
Christey> change description - anyone can log on *as* root<br> Frech> (Note: this XF also cataloged under CVE-1999-0508.)<br>
The Debian mailman package uses weak authentication, which allows attackers to gain privileges.
Status:EntryTrn allows local users to overwrite other users' files via symlinks.
Status:EntryBuffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request.
Status:EntryBuffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
Status:EntryA default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service.
Status:EntryDenial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load.
Status:EntryBuffer overflows in Red Hat net-tools package.
Status:CandidateACCEPT(4) Armstrong, Baker, Cole, Stracener<br> MODIFY(1) Frech<br> REJECT(1) Blake<br>Voter Comments:
Blake> RHSA-1999:017-01 describes "potential security problem fixed" in the absence of knowing whether or not the problems actually existed, I don't think we have an entry here.<br> Frech> XF:redhat-net-tool-bo<br>
Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument.
Status:EntryHotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account.
Status:CandidateACCEPT(1) Levy<br> MODIFY(2) Frech, Stracener<br> NOOP(1) Baker<br>Voter Comments:
Stracener> Many sites are vulnerable to this problem. I recommend removing the explicit references to Hotmail and making the description more generic. Suggest: Javascript can be injected using the STYLE tag in an HTML formatted e-mail, allowing remote attackers to execute commands on user accounts.<br> Frech> XF:hotmail-html-style-embed<br>
Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch.
Status:EntryDenial of service in Netscape Enterprise Server via a buffer overflow in the SSL handshake.
Status:EntryThe w3-msql CGI script provided with Mini SQL allows remote attackers to view restricted directories.
Status:EntryThe INN inndstart program allows local users to gain privileges by specifying an alternate configuration file using the INNCONF environmental variable.
Status:EntryWindows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option.
Status:EntryColdFusion Administrator with Advanced Security enabled allows remote users to stop the ColdFusion server via the Start/Stop utility.
Status:EntryThe ColdFusion CFCRYPT program for encrypting CFML templates has weak encryption, allowing attackers to decrypt the templates.
Status:CandidateACCEPT(3) Baker, Cole, Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:coldfusion-encryption <br> Christey> BUGTRAQ:19990724 Re: New Allaire Security Zone Bulletins and KB Articles URL:http://www.securityfocus.com/archive/1/19471<br> Christey> ADDREF BID:275 URL:http://www.securityfocus.com/bid/275<br>
Netscape Enterprise 3.5.1 and FastTrack 3.01 servers allow a remote attacker to view source code to scripts by appending a %20 to the script's URL.
Status:EntryBuffer overflow in FuseMAIL POP service via long USER and PASS commands.
Status:EntryUndocumented ColdFusion Markup Language (CFML) tags and functions in the ColdFusion Administrator allow users to gain additional privileges.
Status:EntryBuffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program.
Status:EntryWhen Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the "about" protocol to gain access to browser information.
Status:EntryNetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network.
Status:EntryNetBSD allows ARP packets to overwrite static ARP entries.
Status:EntrySGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.
Status:EntryThe Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
Status:EntryBuffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable.
Status:CandidateACCEPT(4) Baker, Blake, Cole, Dik<br> MODIFY(2) Frech, Stracener<br> REVIEWING(2) Christey, Prosser<br>Voter Comments:
Stracener> Add Ref: CIAC: J-069<br> Frech> XF:sun-libc-lcmessages<br> Prosser> BID 268 is an additional reference for this one as it has info on the Sun vulnerability. However, BID 268 also includes AIX in this vulnerability and refs APARS issued to fix a vulnerability in various 'nixs with the Natural Language Service environmental variables NSLPATH and PATH_LOCALE depending on the 'nix, ref CERT CA-97.10, CVE-1999-0041. However, Georgi Guninski reported a BO in AIX with LC_MESSAGES + mount, also refed in BID 268, so it is possible the AIX APARs fix an earlier, similar vulnerability to the Sun BO in LC_MESSAGES. This should probably be considered under a different CAN. Any ideas? <br> Christey> Given that the buffer overflows in CVE-1999-0041 are NLSPATH and PATH_LOCALE, I'd say that's good evidence that this is not the same problem. But a buffer overflow in libc in LC_MESSAGES... We must ask if these are basically the same codebase. ADDREF CIAC:J-069<br> Christey> While the description indicates multiple programs, CD:SF-EXEC does not apply because the vulnerability was in libc, and rcp and ufsrestore were both statically linked against libc. Thus CD:SF-LOC applies, and a single candidate is maintained because the problem occurred in a library.<br> Dik> Sun bug 4240566<br> Christey> I'm consulting with Casper Dik and Troy Bollinger to see if this should be combined with the AIX buffer overflows for LC_MESSAGES; current indications are that they should be split.<br> Christey> For further consultation, consider this post, though it's associated with CVE-1999-0041: BUGTRAQ:19970213 Linux NLSPATH buffer overflow http://www.securityfocus.com/archive/1/6296 Also add "NLSPATH" and "PATH_LOCALE" to the description to facilitate search.<br>
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
Status:EntryVixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.
Status:EntryFirewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service via a large number of connection attempts to unresponsive systems.
Status:EntryThe web components of Compaq Management Agents and the Compaq Survey Utility allow a remote attacker to read arbitrary files via a .. (dot dot) attack.
Status:EntryDenial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
Status:EntryBuffer overflow in Solaris lpset program allows local users to gain root access.
Status:EntryBuffer overflows in Mars NetWare Emulation (NWE, mars_nwe) package via long directory names.
Status:EntryCisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
Status:EntryAlibaba HTTP server allows remote attackers to read files via a .. (dot dot) attack.
Status:CandidateACCEPT(4) Frech, Levy, Ozancin, Stracener<br> MODIFY(1) Baker<br> NOOP(6) Armstrong, Blake, Cole, Landfield, LeBlanc, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> This candidate is unconfirmed by the vendor. Posted by Arne Vidstrom.<br> Blake> I'd like to change my vote on this from ACCEPT to NOOP. I did some digging and the vendor seems to have discontinued the product, so no information is available beyond Arne's post. Unless Andre has a copy in his archive and can test it, I think we have to leave it out.<br> Wall> I agree with Blake. We have not seen the product and it has been discontinued.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> If this is (or was) tested by some tool, we should ACCEPT it.<br> Baker> http://www.securityfocus.com/bid/270<br> Christey> BID:270 URL:http://www.securityfocus.com/bid/270<br>
IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions.
Status:EntryBuffer overflow in Xi Graphics Accelerated-X server allows local users to gain root access via a long display or query parameter.
Status:EntryDenial of service in HP-UX SharedX recserv program.
Status:EntryKDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file.
Status:EntryKDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables.
Status:EntryKDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable.
Status:EntryFreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system.
Status:EntryDenial of service in Oracle TNSLSNR SQL*Net Listener via a malformed string to the listener port, aka NERP.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(1) Cole<br>Voter Comments:
Frech> XF:oracle-tnslsnr-dos(1551)<br>
The INN inndstart program allows local users to gain root privileges via the "pathrun" parameter in the inn.conf file.
Status:EntryThe dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack.
Status:EntryThe SSH authentication agent follows symlinks via a UNIX domain socket.
Status:EntryArkiea nlservd allows remote attackers to conduct a denial of service.
Status:EntryBuffer overflow in AIX ftpd in the libc library.
Status:EntryA remote attacker can read information from a Netscape user's cache via JavaScript.
Status:EntryHybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol.
Status:EntryROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration.
Status:CandidateACCEPT(1) Baker<br> MODIFY(2) Frech, Stracener<br> NOOP(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Stracener> Change the Ref to read: ROOTSHELL: Osicom Technologies ROUTERmate Security Advisory<br> Frech> XF:routermate-snmp-community<br> Christey> BUGTRAQ:19980914 [rootshell] Security Bulletin #23 URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90581019105693&w=2<br>
Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet.
Status:EntryMicrosoft Excel does not warn a user when a macro is present in a Symbolic Link (SYLK) format file.
Status:EntryThe NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches.
Status:CandidateACCEPT(2) Baker, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Ozancin<br>Voter Comments:
Frech> XF:sun-nisplus<br>
FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing attacks.
Status:EntryNIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries.
Status:EntryBuffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
Status:CandidateACCEPT(3) Baker, Ozancin, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Christey> Is CVE-1999-0389 a duplicate of CVE-1999-0798? CVE-1999-0389 has January 1999 dates associated with it, while CVE-1999-0798 was reported in late December. http://marc.theaimsgroup.com/?l=bugtraq&m=91278867118128&w=2 SCO appears to have acknowledged this as well: ftp://ftp.sco.com/SSE/security_bulletins/SB-99.01a The poster also claims that OpenBSD fixed this as well.<br> Frech> XF:bootp-remote-bo<br> Christey> Further analysis indicates that this is a duplicate of CVE-1999-0799<br> CHANGE> [Christey changed vote from REJECT to NOOP]<br> Christey> What was I thinking? Brian Caswell pointed out that this is *not* the same bug as CVE-1999-0799. As reported in the 1998 Bugtraq post, the bug is in bootpd.c, and is related to providing an htype value that is used as an index into an array, and exceeds the intended boundaries of that array.<br>
Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location.
Status:EntryThe GetFile.cfm file in Allaire Forums allows remote attackers to read files through a parameter to GetFile.cfm.
Status:EntryBMC Patrol allows remote attackers to gain access to an agent by spoofing frames.
Status:EntryBuffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon.
Status:EntryThe fwluser script in AIX eNetwork Firewall allows local users to write to arbitrary files via a symlink attack.
Status:EntryDenial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Status:EntryNovell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests.
Status:CandidateACCEPT(2) Baker, Frech<br> NOOP(2) Christey, Cole<br>Voter Comments:
Christey> BID:276 URL:http://www.securityfocus.com/vdb/bottom.html?vid=276<br> Frech> XF:novell-tts-dos<br>
Buffer overflow in Solaris dtprintinfo program.
Status:EntryThe Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users.
Status:EntryMultiple buffer overflows in ISC DHCP Distribution server (dhcpd) 1.0 and 2.0 allow a remote attacker to cause a denial of service (crash) and possibly execute arbitrary commands via long options.
Status:CandidateACCEPT(4) Armstrong, Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:dhcp-remote-dos(7248)<br>
Netscape Communicator 4.x with Javascript enabled does not warn a user of cookie settings, even if they have selected the option to "Only accept cookies originating from the same server as the page being viewed".
Status:EntryDenial of service in Samba NETBIOS name service daemon (nmbd).
Status:EntryBuffer overflow in Samba smbd program via a malformed message command.
Status:EntryRace condition in Samba smbmnt allows local users to mount file systems in arbitrary locations.
Status:EntryCfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program on behalf of the user, allowing local users to gain root privileges.
Status:EntryRed Hat pump DHCP client allows remote attackers to gain root access in some configurations.
Status:EntryMemory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.
Status:EntryThe Motorola CableRouter allows any remote user to connect to and configure the router on port 1024.
Status:CandidateACCEPT(3) Baker, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, LeBlanc<br>Voter Comments:
Christey> This candidate is unconfirmed by the vendor.<br> Frech> XF:motorola-cable-default-pass<br>
Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet.
Status:EntryBuffer overflow in Solaris kcms_configure via a long NETPATH environmental variable.
Status:CandidateACCEPT(2) Armstrong, Stracener<br> MODIFY(4) Cole, Dik, Frech, Prosser<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Cole> This can cause code to be executed.<br> Frech> XF:sol-kcms-conf-netpath-bo<br> Dik> the bug has nothing to do with kcms_configure; it's a bug in libnsl.so. All set-uid executables that trigger this code path are vulnerable. Sun bug 4295834; fixed in Solaris 8.<br> Prosser> Okay, I am confused. Based on Casper's comments and checking on the Sun patch site, I found the 4295834 bug(4295834 NETPATH security problem in libnsl) fixed in SunOS 5.4, Patch 101974-37(x86) 101973 (sparc). Multiple libnsl vulnerabilities was first reported in an 98 Sun Bulletin #00172 for 5.4 up through 2.6. Was this NETPATH a problem that resurfaced in 7 (looks like in 5.4 as well) and was fixed in 8?<br> Christey> Need to dig up my offline email on this.<br> Christey> May be a duplicate of CVE-1999-0321, whose sole reference (XF:sun-kcms-configure-bo) no longer exists. Also examine BID:452 and BUGTRAQ:19981223 Merry Christmas to Sun! (Was: L0pht NFR N-Code Modules Updated) which are the same as XF:sol-kcms-conf-p-bo(3652), which could be the new name for XF:sun-kcms-configure-bo.<br>
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
Status:EntryFreeBSD seyon allows users to gain privileges via a modified PATH variable for finding the xterm and seyon-emu commands.
Status:EntryFreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument.
Status:CandidateACCEPT(2) Armstrong, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Cole<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> I would combine this with the previous. To me the general vulnerabilities are similar it is just the end result that changes.<br> Frech> XF:freebsd-seyon-setgid<br> Christey> ADDREF? CALDERA:CSSA-1999-037.0<br>
Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command.
Status:CandidateACCEPT(4) Armstrong, Baker, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:qpopper-auth-bo<br> Christey> ADDREF? DEBIAN:19991215 buffer overflow in qpopper v3.0 ADDREF XF:qpopper-auth-bo<br>
Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument.
Status:EntryA Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
Status:EntryThe default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.
Status:CandidateACCEPT(4) Armstrong, Baker, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:sco-mail-permissions<br> Christey> ADDREF ftp://ftp.sco.com/SSE/security_bulletins/SB-99.25a<br>
Buffer overflow in FreeBSD angband allows local users to gain privileges.
Status:EntryBy default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
Status:CandidateACCEPT(4) Armstrong, Baker, LeBlanc, Stracener<br> MODIFY(2) Cole, Frech<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> The BID is 855. If I have the right vulnerability, this allows an attacker to access URL's of there choosing which could lead to a compromise of private information.<br> Frech> XF:http-frame-spoof Question: Similar vulnerability to MS98-020 / CVE-1999-0869?<br> LeBlanc> MSRC tells me this is patched in MS00-009<br>
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.
Status:CandidateACCEPT(3) Armstrong, Baker, Stracener<br> MODIFY(2) Cole, Frech<br> REVIEWING(2) Christey, Prosser<br>Voter Comments:
Cole> This is BID 850.<br> Christey> See comments on CVE-1999-0988. Perhaps these two should be merged. ftp://ftp.sco.com/SSE/security_bulletins/SB-99.28a loosely alludes to this problem; the README for patch SSE053 effectively confirms it.<br> Frech> XF:sco-pkg-dacread-fileread<br>
HP Secure Web Console uses weak encryption.
Status:CandidateACCEPT(2) Armstrong, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Cole<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> I could not find details on this using the above references.<br> Frech> XF:hp-secure-console<br>
Buffer overflow in SCO UnixWare Xsco command via a long argument.
Status:CandidateACCEPT(3) Armstrong, Baker, Stracener<br> MODIFY(3) Cole, Frech, Prosser<br> REVIEWING(1) Christey<br>Voter Comments:
Cole> This is BID 824 and the BUGTRAQ reference is 19991125.<br> Frech> XF:sco-unixware-xsco<br> Christey> Confirmed by vendor, albeit vaguely: http://marc.theaimsgroup.com/?l=bugtraq&m=94581379905584&w=2 <br> Prosser> agree with Steve on vendor confirmation, however not sure the fix ref'd in BID 824 (SSE041) is right. It lists fixes for libnsl and tcpip.so, nothing about xsco. SSE050b (ftp://ftp.sco.com/SSE/security_bulletins/SB-99.26b) fixes a buffer overflow in xsco on OpenServer (the vendor message Steve refers to) but not the UnixWare vulnerability reported on Bugtraq and in BID824. Anyone more familar with SCO shed some light on this? Are they the same codebase so fix would be same? From the SCO site it seems the UnixWare and OpenSever products are similar but have differences.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> BID:824 http://www.securityfocus.com/bid/824<br>
Denial of service in Linux syslogd via a large number of connections.
Status:EntryBuffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname.
Status:EntryBuffer overflow in BIND 8.2 via NXT records.
Status:EntryBuffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library.
Status:EntryDenial of service in BIND named via malformed SIG records.
Status:EntryUnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.
Status:EntryDenial of service in BIND by improperly closing TCP sessions via so_linger.
Status:EntryBuffer overflow in Serv-U FTP 2.5 allows remote users to conduct a denial of service via the SITE command.
Status:EntryWindows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled.
Status:EntryBuffer overflow in CDE dtmail and dtmailpr programs allows local users to gain privileges via a long -f option.
Status:CandidateACCEPT(4) Armstrong, Baker, Dik, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Cole<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> I went to 1129 and it looks like a reference for a different vulnerability.<br> Frech> In the description, should dtmailptr be dtmailpr? XF:solaris-dtmailpr-overflow XF:solaris-dtmail-overflow<br> Dik> sun bug: 4166321<br>
Buffer overflow in CDE mailtool allows local users to gain root privileges via a long MIME Content-Type.
Status:CandidateACCEPT(5) Armstrong, Baker, Cole, Dik, Stracener<br> MODIFY(1) Frech<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:cde-mailtool-bo<br> Dik> bug 4163471 (Root access is only possible when mail is send to root and he uses dtmail to read it)<br>
Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack.
Status:EntryDenial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port.
Status:CandidateACCEPT(3) Balinsky, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Armstrong, Baker<br> REVIEWING(3) Christey, Prosser, Ziese<br>Voter Comments:
Frech> XF:cisco-nat-dos<br> Christey> Mike Prosser's REVIEWING vote expires July 17, 2000<br> Ziese> After reviewing http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml I can not confirm this exists unless it's restructred to describe a problem against IOS per se; not NAT per se. I am reviewing this and it may take some time.<br> CHANGE> [Christey changed vote from NOOP to REVIEWING]<br> Christey> Not sure if Kevin's suggested reference really describes this one. However, a followup email by Jim Duncan of Cisco does acknowledge the problem as discussed in the Bugtraq post: http://marc.theaimsgroup.com/?l=vuln-dev&m=94385601831585&w=2 The original post is: http://marc.theaimsgroup.com/?l=bugtraq&m=94184947504814&w=2 It could be that the researcher believed that the problem was NAT, but in fact it wasn't. I need to follow up with Ziese/Balinsky on this one.<br>
Denial of service in MDaemon WorldClient and WebConfig services via a long URL.
Status:CandidateACCEPT(2) Baker, Stracener<br> MODIFY(2) Cole, Frech<br> NOOP(1) Armstrong<br> RECAST(1) Christey<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> 823 and 820 are two different vulnerabilities and should be separated out. They are both buffer overflows but accomplish it in a different fashion and the end exploit is different.<br> Frech> (RECAST?) XF:mdaemon-worldclient-dos XF:mdaemon-webconfig-dos Recast request: This is really two services exhibiting the same problem.<br> Christey> as suggested by others. Also see confirmation at: http://mdaemon.deerfield.com/helpdesk/hotfix.cfm<br>
Buffer overflow in SCO su program allows local users to gain root access via a long username.
Status:CandidateACCEPT(4) Armstrong, Cole, Prosser, Stracener<br> MODIFY(1) Frech<br> RECAST(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> DUPE CVE-1999-0317?<br> Frech> XF:sco-su-username-bo<br> Christey> ADDREF BID:826 CONFIRM:ftp://ftp.sco.com/SSE/sse039.tar.Z<br>
Denial of service in MDaemon 2.7 via a large number of connection attempts.
Status:CandidateACCEPT(5) Armstrong, Baker, Cole, Prosser, Stracener<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:mdaemon-dos<br> Christey> CVE-1999-0844 is confirmed by MDaemon at http://mdaemon.deerfield.com/helpdesk/hotfix.cfm but there is no apparent confirmation for this problem, even though it was posted the same day.<br> Prosser> Looks like from a follow-on message on Bugtraq from Nobuo <http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-11-28&msg=199912011604.HJI39569.BX-NOJ@lac.co.jp> Deerfield sent a reply about the DoS problems in MDaemon 2.8.5, that also talks about fixing the 2.7 J DoS that Nobuo initially reported. Can't find the original message, so may have been limited distro. Looks like an upgrade to the latest release might be the final solution here.<br>
Buffer overflow in free internet chess server (FICS) program, xboard.
Status:EntryDenial of service in BIND named via consuming more than "fdmax" file descriptors.
Status:EntryDenial of service in BIND named via maxdname.
Status:EntryThe default permissions for Endymion MailMan allow local users to read email or modify files.
Status:CandidateACCEPT(2) Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Armstrong, Baker<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:endymion-mailman-perms<br>
Denial of service in BIND named via naptr.
Status:EntryIBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin.
Status:CandidateACCEPT(3) Armstrong, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:websphere-protect<br>
Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure.
Status:EntryUltimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file.
Status:EntryBuffer overflow in FreeBSD gdc program.
Status:CandidateACCEPT(3) Armstrong, Prosser, Stracener<br> MODIFY(2) Cole, Frech<br> NOOP(2) Baker, Christey<br>Voter Comments:
Cole> The BID is 834 and the reference is 19991201 not 1130.<br> Frech> XF:freebsd-gdc-bo<br> Christey> ADDREF BID:780 ?<br>
login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.
Status:EntryFreeBSD gdc program allows local users to modify files via a symlink attack.
Status:CandidateACCEPT(3) Armstrong, Prosser, Stracener<br> MODIFY(2) Cole, Frech<br> NOOP(1) Baker<br>Voter Comments:
Cole> This is via debug output.<br> Frech> XF:freebsd-gdc<br>
Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.
Status:EntrySolaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly.
Status:EntrySolaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack.
Status:CandidateACCEPT(2) Armstrong, Stracener<br> MODIFY(2) Dik, Frech<br> NOOP(2) Baker, Christey<br> REJECT(1) Cole<br> REVIEWING(1) Prosser<br>Voter Comments:
Cole> This is the same as the pervious.<br> Frech> XF:sol-chkperm-vmsys<br> Dik> include reference to Sun bug 4296167<br> Christey> Remove BID:837, which is for arp, not chkperm<br>
Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext.
Status:EntryInsecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file.
Status:CandidateACCEPT(3) Armstrong, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Prosser<br>Voter Comments:
Frech> XF:postgresql-insecure-perms<br>
Buffer overflow in FreeBSD seyon via HOME environmental variable, -emulator argument, -modems argument, or the GUI.
Status:CandidateACCEPT(4) Armstrong, Cole, Prosser, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:freebsd-seyon-bo<br> Christey> ADDREF? CALDERA:CSSA-1999-037.0<br> Christey> May be multiple bugs here, or a single library problem. CD:SF-LOC needs to be resolved before determining if this candidate should be SPLIT. Also see CVE-1999-0821.<br>
UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file.
Status:EntryBuffer overflow in CommuniGatePro via a long string to the HTTP configuration port.
Status:EntryBuffer overflow in UnixWare xauto program allows local users to gain root privilege.
Status:EntryDenial of service in IIS 4.0 via a flood of HTTP requests with malformed headers.
Status:Entryucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.
Status:EntryInternet Explorer 3.x to 4.01 allows a remote attacker to insert malicious content into a frame of another web site, aka frame spoofing.
Status:EntryInternet Explorer 4.01 allows remote attackers to read arbitrary files by pasting a file name into the file upload control, aka untrusted scripted paste.
Status:EntryInternet Explorer 4.0 and 4.01 allow a remote attacker to read files via IE's cross frame security, aka the "Cross Frame Navigate" vulnerability.
Status:EntryBuffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Status:CandidateMODIFY(2) Cole, Frech<br> NOOP(1) Baker<br> REJECT(3) Blake, Christey, Stracener<br>Voter Comments:
Cole> 611 is the mail to listed above but 759 is for the mail from and should be listed as a separate vulenrability.<br> Blake> This does not appear materially different from CVE-1999-0768<br> Christey> This is an apparent duplicate of CVE-1999-0768. REDHAT:RHSA-1999:030-02 describes two issues, one of which is CVE-1999-0768, and the other is CVE-1999-0769.<br> Stracener> This is a duplicate of candidate CVE-1999-0768.<br> Frech> XF:cron-sendmail-bo-root<br> Christey> BID:759 is improperly assigned to this candidate and doesn't even describe it. It may have been inadvertently copied from CVE-1999-0873.<br>
Buffer overflow in Skyfull mail server via MAIL FROM command.
Status:EntryBuffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
Status:EntryDHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes.
Status:EntryBuffer overflow in Internet Explorer 4.0 via EMBED tag.
Status:EntryInternet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME.
Status:EntryBuffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.
Status:EntryBuffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
Status:EntryDenial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly.
Status:EntryFalcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:EntryFalcon web server allows remote attackers to determine the absolute path of the web root via long file names.
Status:CandidateACCEPT(3) Baker, Blake, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Armstrong, Cole<br>Voter Comments:
Frech> XF:falcon-server-long-filename<br>
Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.
Status:EntryThe Zeus web server administrative interface uses weak encryption for its passwords.
Status:EntryAlibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.
Status:CandidateACCEPT(2) Baker, Stracener<br> MODIFY(1) Frech<br> NOOP(5) Armstrong, Blake, Christey, Cole, LeBlanc<br>Voter Comments:
Christey> This candidate is unconfirmed by the vendor.<br> Blake> Same as CVE-1999-0776.<br> Frech> XF:alibaba-url-file-manipulation<br> Christey> CD:SF-LOC and CD:SF-EXEC may say to merge this candidate with the problems described in: BUGTRAQ:20000718 Multiple bugs in Alibaba 2.0 URL:http://archives.neohapsis.com/archives/bugtraq/2000-07/0237.html If so, then ADDREF BID:1485 as well.<br> Christey> Include the names of the affected CGI's, including tst.bat, get32.exe, alibaba.pl, etc.<br>
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
Status:EntryFTGate web interface server allows remote attackers to read files via a .. (dot dot) attack.
Status:Entrydbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script.
Status:EntryCisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
Status:EntryiHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error.
Status:EntryThe "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect.
Status:EntryBuffer overflow in Netscape Communicator before 4.7 via a dynamic font whose length field is less than the size of the font.
Status:EntryuserOsa in SCO OpenServer allows local users to corrupt files via a symlink attack.
Status:EntryRed Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
Status:EntryFirewall-1 does not properly restrict access to LDAP attributes.
Status:EntryBuffer overflow in RealNetworks RealServer administration utility allows remote attackers to execute arbitrary commands via a long username and password.
Status:EntryiChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:EntryBuffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.
Status:EntryThe Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
Status:EntryBuffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.
Status:Entryypserv allows a local user to modify the GECOS and login shells of other users.
Status:Entryypserv allows local administrators to modify password tables.
Status:Entrygenfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.
Status:EntryBuffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username.
Status:EntryDenial of service in Axent Raptor firewall via malformed zero-length IP options.
Status:EntryBuffer overflow in sccw allows local users to gain root access via the HOME environmental variable.
Status:Entrysccw allows local users to read arbitrary files.
Status:EntryDenial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter.
Status:EntryMultihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Status:EntryMicrosoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user.
Status:CandidateACCEPT(4) Baker, Ozancin, Prosser, Wall<br> MODIFY(2) Frech, Stracener<br> REJECT(1) Cole<br>Voter Comments:
Frech> XF:siteserver-cis-cookie-cache<br> Cole> Whether cookies are a vulnerbality is a debate for another time, the question here is whether the expiration feature is a vulnerability and I do not think it is because the underlying concerns for this are present even without this feature. The expiration feature does not add any new vulenrabilities that are not already present with cookies.<br> Stracener> Add Ref: MSKB Q238647<br>
Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Status:CandidateACCEPT(5) Baker, Blake, Cole, Prosser, Stracener<br> MODIFY(1) Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:proftpd-long-dir-bo(3399)<br> Christey> Not absolutely sure if this isn't the same as Palmetto (CVE-1999-0368), which describes a similar type of overflow. NETBSD:NetBSD-SA1999-003 may refer to CVE-1999-0368: ADDREF URL:ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-003.txt.asc<br> Christey> ADDREF CIAC:J-068 Include version numbers; too many wu-ftp/etc. problems were published in summer/fall 1999<br>
FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files.
Status:Entrydfire.cgi script in Dragon-Fire IDS allows remote users to execute commands via shell metacharacters.
Status:CandidateACCEPT(2) Blake, Stracener<br> MODIFY(1) Frech<br> NOOP(4) Armstrong, Baker, Cole, LeBlanc<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Some voters should use ABSTAIN. <br> Frech> XF:dragon-fire-ids-metachar(3834)<br> CHANGE> [Armstrong changed vote from REVIEWING to NOOP]<br>
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
Status:EntryURL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:EntryWebTrends software stores account names and passwords in a file which does not have restricted access permissions.
Status:EntryThe Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files.
Status:EntryDenial of service in various Windows systems via malformed, fragmented IGMP packets.
Status:EntryA memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.
Status:CandidateACCEPT(2) Baker, Cole<br> MODIFY(1) Frech<br> NOOP(7) Armstrong, Christey, Landfield, LeBlanc, Ozancin, Stracener, Wall<br> REVIEWING(1) Levy<br>Voter Comments:
Christey> This candidate is unconfirmed by the vendor.<br> Frech> XF:motorola-cable-crash<br> Christey> This has enough votes, but not the "confidence" yet (until we resolve the question of the amount of verification needed for CVE).<br>
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
Status:EntryBMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service.
Status:EntryAn example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file.
Status:EntrySample runnable code snippets in ColdFusion Server 4.0 allow remote attackers to read files, conduct a denial of service, or use the server as a proxy for other HTTP calls.
Status:CandidateACCEPT(2) Baker, Cole<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:coldfusion-source-display(1741) XF:coldfusion-syntax-checker(1742) XF:coldfusion-file-existence(1743) XF:coldfusion-sourcewindow(1744)<br> Christey> List all affected runnable code snippets to facilitate search, which may include: viewexample.cfm (though could that be part of CVE-1999-0922?)<br>
The Syntax Checker in ColdFusion Server 4.0 allows remote attackers to conduct a denial of service.
Status:EntryUnityMail allows remote attackers to conduct a denial of service via a large number of MIME headers.
Status:CandidateACCEPT(2) Baker, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> XF:unitymail-web-dos(1630)<br> Christey> BID:1760 URL:http://www.securityfocus.com/bid/1760<br> Christey> Affected version is 2.0 Change date of Bugtraq post - it was 1998.<br>
Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Christey> BID:1760 URL:http://www.securityfocus.com/bid/1760<br> Frech> XF:unitymail-web-dos(1630)<br>
NTMail allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:EntryBuffer overflow in SmartDesk WebSuite allows remote attackers to cause a denial of service via a long URL.
Status:EntryNovell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests.
Status:CandidateACCEPT(4) Armstrong, Blake, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br>Voter Comments:
Frech> XF:novell-webserver-dos(2287)<br>
wwwboard allows a remote attacker to delete message board articles via a malformed argument.
Status:EntryBuffer overflow in Mediahouse Statistics Server allows remote attackers to execute commands.
Status:EntryMediahouse Statistics Server allows remote attackers to read the administrator password, which is stored in cleartext in the ss.cfg file.
Status:EntryTeamTrack web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Status:Entryclassifieds.cgi allows remote attackers to read arbitrary files via shell metacharacters.
Status:Entryclassifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form.
Status:EntryBNBSurvey survey.cgi program allows remote attackers to execute commands via shell metacharacters.
Status:EntryBNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable.
Status:EntryMBone SDR Package allows remote attackers to execute commands via shell metacharacters in Session Initiation Protocol (SIP) messages.
Status:EntryDenial of service in Debian IRC Epic/epic4 client via a long string.
Status:EntryBuffer overflow in mutt mail client allows remote attackers to execute commands via malformed MIME messages.
Status:EntryMutt mail client allows a remote attacker to execute commands via shell metacharacters.
Status:CandidateACCEPT(1) Stracener<br> NOOP(2) Baker, Christey<br> REJECT(1) Frech<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> References are vague, but seem to be identical to CVE-1999-0940 (XF:mutt-text-enriched-mime-bo). According to the references, the malformed messages consist of metacharacters. In addition, -0941's reference and -0940's SuSE reference both refer to fixes in 1.0pre3 release. Will reconsider vote if other clearer references are forthcoming.<br> Christey> Modify to mention that the metachar's are in the Content-Type header. http://marc.theaimsgroup.com/?l=bugtraq&m=90221104526154&w=2<br>
UnixWare dos7utils allows a local user to gain root privileges by using the STATICMERGE environmental variable to find a script which it executes.
Status:EntryBuffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.
Status:EntryIBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.
Status:CandidateACCEPT(2) Baker, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Bollinger, Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> XF:websphere-database-pwd-accessible<br> Christey> ADDREF BID:1763 URL:http://www.securityfocus.com/bid/1763<br>
Buffer overflow in Internet Mail Service (IMS) for Microsoft Exchange 5.5 and 5.0 allows remote attackers to conduct a denial of service via AUTH or AUTHINFO commands.
Status:EntryBuffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag.
Status:EntryAN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.
Status:EntryBuffer overflow in uum program for Canna input system allows local users to gain root privileges.
Status:CandidateACCEPT(2) Levy, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br>Voter Comments:
Christey> CVE-1999-0948 and CVE-1999-0949 are extremely similar. uum (0948) is exploitable through a different set of options than canuum (0949). If it's the same generic option parsing routine used by both programs, then CD:SF-CODEBASE says to merge them. But if it's not, then CD:SF-LOC and CD:SF-EXEC says to split them. However, this is a prime example of how SF-EXEC might be modified - uum and canuum are clearly part of the same package, so in the absence of clear information, maybe we should merge them.<br> Frech> XF:canna-uum-bo<br>
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges.
Status:CandidateACCEPT(2) Levy, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Christey<br>Voter Comments:
Christey> CVE-1999-0948 and CVE-1999-0949 are extremely similar. uum (0948) is exploitable through a different set of options than canuum (0949). If it's the same generic option parsing routine used by both programs, then CD:SF-CODEBASE says to merge them. But if it's not, then CD:SF-LOC and CD:SF-EXEC says to split them. However, this is a prime example of how SF-EXEC might be modified - uum and canuum are clearly part of the same package, so in the absence of clear information, maybe we should merge them. Also review BID:758 and BID:757 - may need to change the BID here.<br> Frech> XF:canna-uum-bo<br> Christey> CHANGEREF BID:757 BID:758<br> Christey> The following page says that canuum is a "Japanese input tty frontend for Canna using uum," which suggests that it is, at the least, a different package, so perhaps this should stay SPLIT. http://wuarchive.wustl.edu/mirrors/NetBSD/NetBSD-current/pkgsrc/inputmethod/canuum/README.html<br>
Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Status:EntryBuffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.
Status:EntryBuffer overflow in Solaris lpstat via class argument allows local users to gain root access.
Status:CandidateACCEPT(3) Baker, Ozancin, Stracener<br> MODIFY(2) Dik, Frech<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:solaris-lpstat-bo<br> Christey> It is unclear from Casper Dik's followup whether this is exploitable or not.<br> Dik> Sunbug 4129917 (other reports in the same thread suggest that the then current patchd id fix the problem)<br> Christey> Confirm with Casper Dik that the overflow is in the -c option, and if so, include it in the description to differentiate it from the lpstat -n buffer overflow.<br>
WWWBoard stores encrypted passwords in a password file that is under the web root and thus accessible by remote attackers.
Status:EntryWWWBoard has a default username and default password.
Status:EntryRace condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command.
Status:EntryThe NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service.
Status:EntryMajorCool mj_key_cache program allows local users to modify files via a symlink attack.
Status:Entrysudo 1.5.x allows local users to execute arbitrary commands via a .. (dot dot) attack.
Status:EntryIRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
Status:EntryIRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.
Status:EntryHPUX sysdiag allows local users to gain root privileges via a symlink attack during log file creation.
Status:EntryBuffer overflow in HPUX passwd command allows local users to gain root privileges via a command line option.
Status:EntryFreeBSD mount_union command allows local users to gain root privileges via a symlink attack.
Status:EntryBuffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable.
Status:EntryRace condition in xterm allows local users to modify arbitrary files via the logging option.
Status:EntryBuffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].
Status:EntryBuffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol.
Status:EntryBuffer overflow in BNC IRC proxy allows remote attackers to gain privileges.
Status:EntryThe Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Status:EntryThe OmniHTTPD visadmin.exe program allows a remote attacker to conduct a denial of service via a malformed URL which causes a large number of temporary files to be created.
Status:CandidateACCEPT(3) Baker, Blake, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Christey<br> REVIEWING(1) Levy<br>Voter Comments:
Frech> XF:omnihttpd-dos<br> Christey> Some sort of confirmation might be findable at: http://www.omnicron.ab.ca/httpd/docs/release.html<br> Christey> See http://www.omnicron.ab.ca/index.html The August 16, 2000 news item says "This release fixes some security problems." It's for version 2.07, but the discloser didn't say what version was available. Other security fixes are in the release notes at http://www.omnicron.ab.ca/httpd/docs/release.html Notes for Professional Version 1.01 say "Patched up two security weaknesses." Notes for version 2.07 say "Fixes dot-appending vulnerability." Professional Alpha 7 says "Revamped CGI launching and security," Professional Alpha 4 says "Fixed SSI path mapping and security problems," Alpha 5 says "Security fixup." In other words, you can't tell whether they've fixed this bug or not.<br> Christey> BID:1808 URL:http://www.securityfocus.com/bid/1808<br>
Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.
Status:EntryBuffer overflow in Xshipwars xsw program.
Status:EntryBuffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode.
Status:EntryBuffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.
Status:EntryThe Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.
Status:EntrySendmail allows local users to reinitialize the aliases database via the newaliases command, then cause a denial of service by interrupting Sendmail.
Status:EntryBuffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request.
Status:Entryhtdig allows remote attackers to execute commands via filenames with shell metacharacters.
Status:EntryThe SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.
Status:EntryWindows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.
Status:EntryInternet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
Status:EntryThe Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file.
Status:EntryWhois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
Status:CandidateACCEPT(3) Blake, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> More examination is required to determine if CVE-1999-0983, CVE-1999-0984, or CVE-1999-0985 are the same codebase.<br> Frech> XF:whois-internic-shell-meta<br> Christey> ADDREF BID:2000<br> Christey> The XF appears to be gone. Perhaps it's this one: XF:http-cgi-whois-meta(3798)<br>
Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
Status:CandidateACCEPT(2) Blake, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Cole<br> REVIEWING(1) Christey<br>Voter Comments:
Cole> How is this different than the previous?<br> Christey> More examination is required to determine if CVE-1999-0983, CVE-1999-0984, or CVE-1999-0985 are the same codebase.<br> Frech> XF:matts-whois-meta<br> Christey> ADDREF BID:2000<br> Christey> XF reference is gone. Replace with http-cgi-matts-whois-meta(3799) ?<br>
CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
Status:CandidateACCEPT(2) Blake, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Baker, Cole<br> REVIEWING(1) Christey<br>Voter Comments:
Cole> I would combine all of these.<br> Christey> More examination is required to determine if CVE-1999-0983, CVE-1999-0984, or CVE-1999-0985 are the same codebase.<br> Frech> XF:cc-whois-meta<br> Christey> ADDREF BID:2000<br> Frech> Change cc-whois-meta(3800) to http-cgi-ccwhois(3747)<br> Christey> Replace XF reference with XF:cc-whois-meta(3800) ?<br>
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Status:EntryWindows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
Status:EntryUnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
Status:CandidateACCEPT(3) Baker, Blake, Cole<br> MODIFY(1) Frech<br> RECAST(1) Stracener<br> REVIEWING(1) Christey<br>Voter Comments:
Stracener> The pkg* programs pkgtrans, pkginfo, pkgcat, pkginstall, and pkgparam can be used to mount etc/shadow printing attacks as a result of the "dacread" permission (cf. /etc/security/tcb/privs). The procedural differences between the individual exploits for each of these utilities are therefore inconsequential. CVE-1999-0988 should be merged with CVE-1999-0828. From the standpoint of maintaining consistency of the level of abstraction used in CVE, the co-existence of CANS 1999-0988/1999-0828 present two choices: either merge 0988 with 0828, or split 0828 into 4 distinct candidates, keeping 0988 intact. Due to the very small differences (in principle) between the exploits subsumed by 0828 and 0988 and the shared dacread permissions of the pkg* suite, I suggest a merge. Below is a summary of the data upon which my decision was based. utility exploit -------- ---------------------------------- <br> pkgtrans --> symlink + dacread permission prob<br> pkginfo --> truss (debugging utility) in conjunction with pkginfio -d etc/shadow. In this case, it captures the interaction between pkginfo the shadow file. Once again: dacread.<br> pkgcat --> buffer overflow + dacread permission prob<br> pkginstall -> buffer overflow + dacread permission prob<br> pkgparam --> -f etc/shadow (works because of dacread).<br> Christey> This is a tough one. While there are few procedural differences, one could view "assignment of an improper permission" as a "class" of problems along the lines of buffer overflows and the like. Just like some programs were fine until they got turned into CGI scripts, this could be an emerging pattern which should be given consideration. Consider the Eyedog and scriptlet.typelib ActiveX utilities being marked as safe for scripting (CVE-1999-0668 and 0669). ftp://ftp.sco.com/SSE/security_bulletins/SB-99.28a loosely alludes to this problem; the README for patch SSE053 effectively confirms it.<br> Frech> XF:unixware-pkgtrans-symlink<br>
Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol.
Status:EntryError messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system.
Status:CandidateACCEPT(3) Blake, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Baker<br>Voter Comments:
Frech> XF:verbose-auth-identify-user(3804)<br>
Buffer overflow in GoodTech Telnet Server NT allows remote users to cause a denial of service via a long login name.
Status:EntryHP VirtualVault with the PHSS_17692 patch allows unprivileged processes to bypass access restrictions via the Trusted Gateway Proxy (TGP).
Status:EntryModifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed.
Status:CandidateACCEPT(2) Stracener, Wall<br> MODIFY(1) Frech<br> NOOP(2) Baker, Cole<br> REJECT(1) LeBlanc<br>Voter Comments:
Frech> XF:exchange-acl-changes(3916)<br> LeBlanc> Not a vulnerability<br>
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
Status:EntryWindows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Status:EntryBuffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request.
Status:Entrywu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Status:EntryCisco Cache Engine allows an attacker to replace content in the cache.
Status:EntryMicrosoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS packet.
Status:EntryThe web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
Status:EntryCisco Cache Engine allows a remote attacker to gain access via a null username and password.
Status:EntryNetscape Navigator uses weak encryption for storing a user's Netscape mail password.
Status:CandidateACCEPT(4) Baker, Cole, Stracener, Wall<br> MODIFY(1) Frech<br> NOOP(1) Christey<br>Voter Comments:
Frech> XF:netscape-mail-encryption(3921)<br> Christey> CHANGEREF make the RCA URL a "MISC" reference<br>
War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connections.
Status:CandidateACCEPT(3) Baker, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:warftp-connection-flood<br>
Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command.
Status:EntryGroupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter.
Status:EntryGroupwise web server GWWEB.EXE allows remote attackers to determine the real path of the web server via the HELP parameter.
Status:CandidateACCEPT(4) Baker, Cole, Prosser, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> XF:groupwise-web-path<br> Prosser> Pretty well confirmed by testing with responses to BugTraq list. additional ref: BugTraq ID 879 http://www.securityfocus.com/bid/879<br> Christey> A later discovery almost 2 years later is at: BUGTRAQ:20020227 SecurityOffice Security Advisory:// Novell GroupWise Web Access Path Disclosure Vulnerability http://marc.theaimsgroup.com/?l=bugtraq&m=101494830315071&w=2 CD:SF-LOC might suggest merging these together.<br>
Buffer overflow in VDO Live Player allows remote attackers to execute commands on the VDO client via a malformed .vdo file.
Status:Entryxsoldier program allows local users to gain root access via a long argument.
Status:EntryThe Disney Go Express Search allows remote attackers to access and modify search information for users by connecting to an HTTP server on the user's system.
Status:CandidateACCEPT(1) Baker<br> MODIFY(1) Frech<br> NOOP(4) Balinsky, Cole, Stracener, Wall<br>Voter Comments:
Frech> XF:disney-search-info(3955)<br> Balinsky> The go.express.com web site does not mention the existence of the Express web server mentioned in the advisory. There appears to be no way of verifying this.<br>
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
Status:EntryThe Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
Status:EntrySMTP component of Lotus Domino 4.6.1 on AS/400, and possibly other operating systems, allows a remote attacker to crash the mail server via a long string.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> (Task 1770)<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:lotus-domino-smtp-dos(8790)<br>
named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:aix-named-xfer-root-access(3308)<br>
Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument.
Status:EntryBuffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a remote attacker to cause a denial of service (crash) via a long HELO command.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:smtp-helo-bo(886)<br>
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
Status:CandidateACCEPT(2) Cole, Wall<br> MODIFY(1) Frech<br> NOOP(2) Christey, Foat<br>Voter Comments:
Frech> XF:ms-html-table-form-dos(3246)<br> Frech> XF:ms-html-table-form-dos(3246)<br> Christey> Add period to the end of the description.<br>
Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> (Task 2281)<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:emurl-attachment-execution(8794)<br>
IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:linux-ipchains-bypass-filter(6516)<br> Frech> XF:linux-ipchains-bypass-filter(6516)<br>
SpectroSERVER in Cabletron Spectrum Enterprise Manager 5.0 installs a directory tree with insecure permissions, which allows local users to replace a privileged executable (processd) with a Trojan horse, facilitating a root or Administrator compromise.
Status:EntryThe installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade.
Status:Entryserial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Christey, Foat<br>Voter Comments:
Christey> Note: CVE-1999-1310 is a duplicate of this candidate. CVE-1999-1310 will be REJECTed; this is the proper CAN to use. CIAC:F-01 URL:http://ciac.llnl.gov/ciac/bulletins/f-01.shtml SGI:19941001-01-P URL:ftp://patches.sgi.com/support/free/security/advisories/19941001-01-P MISC:http://www.netsys.com/firewalls/firewalls-9410/0019.html<br>
useradd in Solaris 7.0 does not properly interpret certain date formats as specified in the "-e" (expiration date) argument, which could allow users to login after their accounts have expired.
Status:CandidateACCEPT(1) Dik<br> MODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Dik> sun bug: 4222400<br> Frech> XF:solaris-useradd-expired-accounts(8375) CONFIRM:(2.6)110883-01, (2.6_x86) 110884-01, (7)110869-01, (7_x86) 110870-01<br>
ip_print procedure in Tcpdump 3.4a allows remote attackers to cause a denial of service via a packet with a zero length header, which causes an infinite loop and core dump when tcpdump prints the packet.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:tcpdump-ipprint-dos(8373)<br>
CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-cde-nisplus-lock(7473)<br> Dik> sun bug: 4115685<br>
aspppd on Solaris 2.5 x86 allows local users to modify arbitrary files and gain root privileges via a symlink attack on the /tmp/.asppp.fifo file.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> XF:sun-aspppd-tmp-symlink(7173)<br>
Solaris 2.6 HW3/98 installs admintool with world-writable permissions, which allows local users to gain privileges by replacing it with a Trojan horse program.
Status:EntrySymantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631.
Status:EntrySSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via an HTTP request that ends in %0A (newline), which causes a malformed entry in the counter log that produces an access violation.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:http-cgi-counter-long(2196)<br> Frech> XF:http-cgi-counter-long(2196)<br>
counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via a long argument.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:http-cgi-counter-long(2196)<br> Frech> XF:http-cgi-counter-long(2196)<br>
Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges.
Status:EntryMicrosoft Outlook Express before 4.72.3612.1700 allows a malicious user to send a message that contains a .., which can inadvertently cause Outlook to re-enter POP3 command mode and cause the POP3 session to hang.
Status:CandidateACCEPT(2) Cole, Wall<br> MODIFY(1) Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> (Task 2241)<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:outlook-pop3-dot-dos(8926)<br>
Vulnerability in login in AT&T System V Release 4 allows local users to gain privileges.
Status:EntryIIS 3.0 and 4.0 on x86 and Alpha allows remote attackers to cause a denial of service (hang) via a malformed GET request, aka the IIS "GET" vulnerability.
Status:EntryCOPS 1.04 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files in (1) res_diff, (2) ca.src, and (3) mail.chk.
Status:CandidateACCEPT(1) Foat<br> MODIFY(1) Frech<br> NOOP(2) Cole, Wall<br>Voter Comments:
Frech> XF:cops-temp-file-symlink(7325)<br>
rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.
Status:EntryTiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable.
Status:CandidateACCEPT(1) Foat<br> MODIFY(1) Frech<br> NOOP(2) Cole, Wall<br>Voter Comments:
Frech> XF:tiger-workdir-symlink(7326)<br>
Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> REJECT(1) Frech<br>Voter Comments:
Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> NOOP(1) Christey<br> REJECT(1) Frech<br>Voter Comments:
Christey> This candidate and CVE-1999-1501 are duplicates. However, CVE-1999-1501 will be REJECTed in favor of this candidate. Add the following references: BID:70 URL:http://www.securityfocus.com/bid/70 BID:71 URL:http://www.securityfocus.com/bid/71 XF:irix-ipxchk-ipxlink-ifs-commands(7365) URL:http://xforce.iss.net/static/7365.php<br>
Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:sco-openserver-mscreen-bo(1379)<br> Christey> Possible dupe with CVE-1999-1185.<br>
Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which may expose sensitive information, to local users such as user IDs, passwords and SNMP community strings.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REJECT(3) Armstrong, Balinsky, Christey<br>Voter Comments:
Frech> XF:cisco-crm-file-vuln(1575)<br> Armstrong> I think that this is the same as Can-1999-1126<br> Balinsky> This is the same as CVE-1999-1126. Merge them.<br> Christey> DUPE CVE-1999-1126, as noted by others. This candidate will be rejected. CVE-1999-1126 will be promoted.<br>
Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error).
Status:CandidateACCEPT(3) Cole, Foat, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:exchange-dos(1223)<br>
Vulnerability in Advanced File System Utility (advfs) in Digital UNIX 4.0 through 4.0d allows local users to gain privileges.
Status:Entrypnserver in RealServer 5.0 and earlier allows remote attackers to cause a denial of service by sending a short, malformed request.
Status:EntryBuffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities.
Status:EntryBuffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
Status:EntryARCserve NT agents use weak encryption (XOR) for passwords, which allows remote attackers to sniff the authentication request to port 6050 and decrypt the password.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:arcserve-agent-passwords(1822)<br>
Directory traversal vulnerability in Matt Wright FormHandler.cgi script allows remote attackers to read arbitrary files via (1) a .. (dot dot) in the reply_message_attach attachment parameter, or (2) by specifying the filename as a template.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> Abstraction and definition issue: CD:SF-LOC suggests combining issues of the same type. Some people refer to "directory traversal" and just mean .. problems; but there are other issues (specifying an absolute pathname, using C: drive letters, doing encodings) that, to my way of thinking, are "different." Perhaps this should be split. My brain hurts too much right now. There are a couple problems with the references and descriptions of CVE-1999-1050 and CVE-1999-1051. I'm interpreting the underlying nature of the problem(s) a little differently than others are. Some of it may be due to differing definitions or thoughts about what "directory traversal vulnerabilities" are.<br>
Default configuration in Matt Wright FormHandler.cgi script allows arbitrary directories to be used for attachments, and only restricts access to the /etc/ directory, which allows remote attackers to read arbitrary files via the reply_message_attach attachment parameter.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:formhandler-cgi-reply-message(7782)<br> Christey> I view one of these as a configuration issue: FormHandler.cgi *could* be configured to limit hard-coded pathnames to a single directory which, while being an information leak, would still be "reasonably secure." But by default, it's just not configured that way. My brain hurts too much right now. There are a couple problems with the references and descriptions of CVE-1999-1050 and CVE-1999-1051. I'm interpreting the underlying nature of the problem(s) a little differently than others are. Some of it may be due to differing definitions or thoughts about what "directory traversal vulnerabilities" are.<br>
Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:frontpage-formresults-world-readable(8362)<br>
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:guestbook-cgi-command-execution(7783)<br>
The default configuration of FLEXlm license manager 6.0d, and possibly other versions, allows remote attackers to shut down the server via the lmdown command.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br>Voter Comments:
Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel "CALL Vulnerability."
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REJECT(1) Christey<br>Voter Comments:
Frech> XF:vms-monitor-gain-privileges(7136)<br> Christey> DUPE CVE-1999-1395 This CAN is being rejected in favor of CVE-1999-1395 because CVE-1999-1395 has more references.<br>
VMS 4.0 through 5.3 allows local users to gain privileges via the ANALYZE/PROCESS_DUMP dcl command.
Status:EntryBuffer overflow in Vermillion FTP Daemon VFTPD 1.23 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via several long CWD commands.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Vulnerability in rexec daemon (rexecd) in AT&T TCP/IP 4.0 for various SVR4 systems allows remote attackers to execute arbitrary commands.
Status:EntryBuffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:tetrinet-dns-hostname-bo(7500)<br>
HP Laserjet printers with JetDirect cards, when configured with TCP/IP, can be configured without a password, which allows remote attackers to connect to the printer and change its IP address or disable logging.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> CONFIRM:http://www.hp.com/cposupport/printers/support_doc/bpl 02914.html<br>
HP Laserjet printers with JetDirect cards, when configured with TCP/IP, allow remote attackers to bypass print filters by directly sending PostScript documents to TCP ports 9099 and 9100.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> DELREF:XF:laserjet-unpassworded(1876) ADDREF:XF:hp-printer-flood(1818)<br>
CDomain whois_raw.cgi whois CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the fqdn parameter.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Multiple buffer overflows in WindowMaker 0.52 through 0.60.0 allow attackers to cause a denial of service and possibly execute arbitrary commands by executing WindowMaker with a long program name (argv[0]).
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:windowmaker-bo(3249)<br> Frech> XF:windowmaker-bo(3249)<br>
Palm Pilot HotSync Manager 3.0.4 in Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 14238 while the manager is in network mode.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:palm-hotsync-bo(7785)<br>
Quake 1 server responds to an initial UDP game connection request with a large amount of traffic, which allows remote attackers to use the server as an amplifier in a "Smurf" style attack on another host, by spoofing the connection request.
Status:CandidateMODIFY(1) Frech<br> NOOP(4) Christey, Cole, Foat, Wall<br>Voter Comments:
Christey> This is apparently a problem with the connection protocol. See BUGTRAQ:19980522 NetQuake Protocol problem resulting in smurf like effect. URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221101925989&w=2<br> Frech> XF:quake-udp-connection-dos(7862)<br>
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> I'd be a lot more confident in this vote if there was a more concrete reference strongly associating webdist.cgi and machineinfo.<br>
Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:oracle-webserver-dos(1812)<br>
Directory traversal vulnerability in carbo.dll in iCat Carbo Server 3.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the icatcommand parameter.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> iCat's site at http://www.icat.com/ is shut down, and no further support seems to be available.<br>
Buffer overflow in ping CGI program in Xylogics Annex terminal service allows remote attackers to cause a denial of service via a long query parameter.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:annex-ping-crash(2090)<br>
Excite for Web Servers (EWS) 1.1 installs the Architext.conf authentication file with world-writeable permissions, which allows local users to gain access to Excite accounts by modifying the file.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Excite for Web Servers (EWS) 1.1 allows local users to gain privileges by obtaining the encrypted password from the world-readable Architext.conf authentication file and replaying the encrypted password in an HTTP request to AT-generated.cgi or AT-admin.cgi.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
Excite for Web Servers (EWS) 1.1 records the first two characters of a plaintext password in the beginning of the encrypted password, which makes it easier for an attacker to guess passwords via a brute force or dictionary attack.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking.
Status:Entryinetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:aix-ttdbserver(813) CONFIRM:APAR IX70400<br>
Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.
Status:CandidateACCEPT(2) Cole, Foat<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:macos-idle-screenlock-bypass(7794)<br>
Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock.
Status:CandidateACCEPT(2) Cole, Foat<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:macos-debug-screenlock-access(3426)<br>
WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:wsftp-weak-password-encryption(8349)<br>
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:aix-ptrace-setgid(7487)<br>
rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.
Status:EntryVulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(1) Foat<br>Voter Comments:
Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:jana-server-directory-traversal(6513)<br>
Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Frech> XF:jana-server-directory-traversal(6513)<br> Christey> MODIFY description - the attack is of the form "/./../" (single dot followed by double-dot)<br>
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
Status:CandidateACCEPT(3) Cole, Foat, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:nt-registry-permissions(4111)<br>
SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack."
Status:EntryNovell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:netware-ipx-session-spoof(2350)<br>
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.
Status:EntryVulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.
Status:EntryUNIX news readers tin and rtin create the /tmp/.tin_log file with insecure permissions and follow symlinks, which allows attackers to modify the permissions of files writable by the user via a symlink attack.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read passwords from the .inputhistory file.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:tin-insecure-permissions(7796) Confirmed in changelog for 1.4.1 http://ftp.kreonet.re.kr/pub/tools/news/tin/v1.4/CHANGES<br>
Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page.
Status:EntryBuffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."
Status:Entrysort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Christey, Cole, Foat<br>Voter Comments:
Frech> XF:sort-tmp-file-symlink(7182)<br> Christey> This issue clearly has a long history. CALDERA:CSSA-2002-SCO.21 URL:http://archives.neohapsis.com/archives/linux/caldera/2002-q2/0018.html CALDERA:CSSA-2002-SCO.2 URL:http://archives.neohapsis.com/archives/linux/caldera/2002-q1/0002.html (There are 2 Caldera advisories because one is for Open UNIX and UnixWare, and the other is for OpenServer) XF:openserver-sort-symlink(9218) URL:http://www.iss.net/security_center/static/9218.php<br>
Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.
Status:EntryKerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user.
Status:EntryCisco PIX Private Link 4.1.6 and earlier does not properly process certain commands in the configuration file, which reduces the effective key length of the DES key to 48 bits instead of 56 bits, which makes it easier for an attacker to find the proper key via a brute force attack.
Status:EntryKabsoftware Lydia utility uses weak encryption to store user passwords in the lydia.ini file, which allows local users to easily decrypt the passwords and gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:lydia-ini-passwords(7501) ADDREF:http://www.kabsoftware.com/lydia_history.txt (Version History for Lydia, V3.3 - 11/24/00)<br>
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times.
Status:Entrydxconsole in DEC OSF/1 3.2C and earlier allows local users to read arbitrary files by specifying the file with the -file parameter.
Status:EntryWindows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords.
Status:EntryWindows 95, when Remote Administration and File Sharing for NetWare Networks is enabled, creates a share (C$) when an administrator logs in remotely, which allows remote attackers to read arbitrary files by mapping the network drive.
Status:EntryBuffer overflow in kppp in KDE allows local users to gain root access via a long -c (account_name) command line argument.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Buffer overflow in kppp in KDE allows local users to gain root access via a long PATH environmental variable.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br> REJECT(2) Christey, Frech<br>Voter Comments:
Frech> Has exactly the same attributes as CVE-1999-1107.<br> Christey> DUPE CVE-1999-1107.<br>
Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated.
Status:EntryWindows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:ie-mediaplayer-activex(7800)<br>
Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator Canary security mechanisms by using a non-linear attack which directly modifies a pointer to a return address instead of using a buffer overflow to reach the return address entry itself.
Status:EntryBuffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the "8BPS" image type in a Photo Shop image header.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:eudora-ims-user-dos(7300) <br>
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges.
Status:EntryVulnerability in the /etc/suid_exec program in HP Apollo Domain/OS sr10.2 and sr10.3 beta, related to the Korn Shell (ksh).
Status:EntryVulnerability in runpriv in Indigo Magic System Administration subsystem of SGI IRIX 6.3 and 6.4 allows local users to gain root privileges.
Status:Entrylquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
Status:Entryndd in Solaris 2.6 allows local users to cause a denial of service by modifying certain TCP/IP parameters.
Status:EntryFTP installation script anon.ftp in AIX insecurely configures anonymous FTP, which allows remote attackers to execute arbitrary commands.
Status:Entrynetprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
Status:EntryThe default configuration for UUCP in AIX before 3.2 allows local users to gain root privileges.
Status:EntryVulnerability in restore in SunOS 4.0.3 and earlier allows local users to gain privileges.
Status:EntryThe installation of Sun Source (sunsrc) tapes allows local users to gain root privileges via setuid root programs (1) makeinstall or (2) winstall.
Status:CandidateACCEPT(5) Cole, Dik, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Dik> sun bug: 1059621<br>
HTTP Client application in ColdFusion allows remote attackers to bypass access restrictions for web pages on other ports by providing the target page to the mainframeset.cfm application, which requests the page from the server, making it look like the request is coming from the local host.
Status:CandidateACCEPT(2) Cole, Wall<br> NOOP(1) Foat<br>Voter Comments:
Oracle Webserver 2.1 and earlier runs setuid root, but the configuration file is owned by the oracle account, which allows any local or remote attacker who obtains access to the oracle account to gain privileges or modify arbitrary files by modifying the configuration file.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:oracle-webserver-gain-root(7174)<br>
Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_".
Status:CandidateACCEPT(5) Armstrong, Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br> REJECT(1) Balinsky<br>Voter Comments:
Balinsky> Duplicate of CVE-1999-1042<br>
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
Status:EntryInternet Explorer 3.01 on Windows 95 allows remote malicious web sites to execute arbitrary commands via a .isp file, which is automatically downloaded and executed without prompting the user.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Christey, Foat<br>Voter Comments:
Frech> XF:http-ie-exec(462)<br> Christey> DELREF MISC:http://oliver.efri.hr/~crv/security/bugs/NT/ie3.html ADDREF MISC:http://focus.silversand.net/vulner/allbug/ie3.html<br>
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag.
Status:CandidateACCEPT(2) Foat, Frech<br> NOOP(2) Cole, Wall<br>Voter Comments:
CHANGE> [Foat changed vote from NOOP to ACCEPT]<br>
Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:netscape-enterprise-view-jhtml(8352)<br>
Buffer overflow in OSF Distributed Computing Environment (DCE) security demon (secd) in IRIX 6.4 and earlier allows attackers to cause a denial of service via a long principal, group, or organization.
Status:EntryWindows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.
Status:EntryHP-UX 9.x and 10.x running X windows may allow local attackers to gain privileges via (1) vuefile, (2) vuepad, (3) dtfile, or (4) dtpad, which do not authenticate users.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Christey<br>Voter Comments:
Christey> CHANGEREF: chaneg XF reference to XF:hp-vue-dt(499)<br>
Vulnerability in Vue 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:hp-vue(2284) Packetstorm URL is dead. Try another archive.<br>
Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Vulnerability in Predictive on HP-UX 11.0 and earlier, and MPE/iX 5.5 and earlier, allows attackers to compromise data transfer for Predictive messages (using e-mail or modem) between customer and Response Center Predictive systems.
Status:EntryThe permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone.
Status:EntrySCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
Status:EntryCharacter-Terminal User Environment (CUE) in HP-UX 11.0 and earlier allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the IOERROR.mytty file.
Status:EntryBuffer overflow in CrackLib 2.5 may allow local users to gain root privileges via a long GECOS field.
Status:EntryAscom Timeplex router allows remote attackers to obtain sensitive information or conduct unauthorized activities by entering debug mode through a sequence of CTRL-D characters.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
SunOS 4.1.2 and earlier allows local users to gain privileges via "LD_*" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user.
Status:EntryVulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs.
Status:EntryCertain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.
Status:EntryVulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.
Status:EntryVulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges.
Status:EntryBuffer overflow in Platinum Policy Compliance Manager (PCM) 7.0 allows remote attackers to execute arbitrary commands via a long string to the Agent port (1827), which is handled by smaxagent.exe.
Status:EntryFTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time.
Status:EntryBuffer overflow in CSM Proxy 4.1 allows remote attackers to cause a denial of service (crash) via a long string to the FTP port.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Compaq/Microcom 6000 Access Integrator does not cause a session timeout after prompting for a username or password, which allows remote attackers to cause a denial of service by connecting to the integrator without providing a username or password.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed login attempts, which allows remote attackers to guess usernames or passwords via a brute force attack.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:microcom-brute-force(7301)<br>
HAMcards Postcard CGI script 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
LakeWeb Filemail CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Christey> I confirmed this problem via visual inspection of the source code in http://www.lakeweb.com/scripts/filemail.zip Line 82 has an insufficient check for shell metacharacters that doesn't exclude semicolons. Line 129 is the call where the metacharacters are injected. Need to add "filemail.pl" to the description.<br>
LakeWeb Mail List CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
BisonWare FTP Server 4.1 and earlier allows remote attackers to cause a denial of service via a malformed PORT command that contains a non-numeric character and a large number of carriage returns.
Status:EntryTcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
Status:EntryBuffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br> RECAST(1) Christey<br>Voter Comments:
Frech> XF:solaris-pam-bo(7432)<br> Dik> sun bug: 4018347<br> Christey> These issues should be SPLIT per CD:SF-EXEC because the PAM problem appears in different Solaris versions than unix_scheme.<br>
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
Status:EntryVulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges.
Status:EntryVulnerability in ppl in HP-UX 10.x and earlier allows local users to gain root privileges by forcing ppl to core dump.
Status:EntryVulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.
Status:EntryVulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/X/V Class console via the Service Support Processor (SSP) Teststation.
Status:EntryMicrosoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:outlook-xuidl-dos(8356)<br>
GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:gnu-finger-privilege-dropping(7175)<br>
Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> (Task 2253)<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:linux-segment-limit-privileges(11202)<br>
Cross-site scripting vulnerability in Third Voice Web annotation utility allows remote users to read sensitive data and generate fake web pages for other Third Voice users by injecting malicious Javascript into an annotation.
Status:Entryinstall.iss installation script for Internet Security Scanner (ISS) for Linux, version 5.3, allows local users to change the permissions of arbitrary files via a symlink attack on a temporary file.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:iss-temp-files(1793) ADDREF:http://www.securityfocus.com/archive/1/12679<br>
nobo 1.2 allows remote attackers to cause a denial of service (crash) via a series of large UDP packets.
Status:CandidateACCEPT(1) Foat<br> MODIFY(1) Frech<br> NOOP(2) Cole, Wall<br>Voter Comments:
Frech> XF:nobo-udp-packet-dos(7502) ADDREF:http://www.securityfocus.com/archive/1/12378 ADDREF:http://web.cip.com.br/nobo/mudancas_en.html<br>
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:imail-registry(1725)<br>
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:wsftp-registry(1726)<br>
By design, Maximizer Enterprise 4 calendar and address book program allows arbitrary users to modify the calendar of other users when the calendar is being shared.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Christey> The discloser does not provide enough details to fully understand what the problem is. This makes it difficult because if Maximizer has a concept of "users" and it is designed to allow any user to modify any other user's data, then this would not be a vulnerability or exposure, unless that "cross-user" capability could be used to violate system integrity, data confidentiality, or the like. There are some features of Maximizer 6.0 that, if abused, could allow someone to do some bad things. For example, an attacker could modify the email addresses for contacts to redirect sales to locations besides the customer. There's also a capability of assigning priorities and alarms, which could be susceptible to an "inconvenience attack" at the very least, as well as tie-ins to e-commerce capabilities. The critical question becomes: "how is this data shared" in the first place? If it's through a network share or other distribution method besides transferring the complete database between sites, then this may be accessible to any attacker who can mimic a Maximizer client (if there is such a thing as a client), and this could be a vulnerability or exposure according to the CVE definition. However, since the Maximizer functionality is unknown to me and not readily apparent from product documentation, it's hard to know what to do about this one.<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:maximizer-enterprise-calendar-modification(7590)<br>
Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions, which allows local users to (1) modify Word Perfect behavior by modifying files in the working directory, or (2) modify files of other users via a symlink attack.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
ZIP drive for Iomega ZIP-100 disks allows attackers with physical access to the drive to bypass password protection by inserting a known disk with a known password, waiting for the ZIP drive to power down, manually replacing the known disk with the target disk, and using the known password to access the target disk.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br>Voter Comments:
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048.
Status:EntryBuffer overflow in cidentd ident daemon allows local users to gain root privileges via a long line in the .authlie script.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:cidentd-authlie-bo(7327)<br>
Directory traversal vulnerability in nph-publish before 1.2 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the pathname for an upload operation.
Status:EntrySambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Vulnerability in man.sh CGI script, included in May 1998 issue of SysAdmin Magazine, allows remote attackers to execute arbitrary commands.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:mansh-execute-commands(7328)<br>
O'Reilly WebSite 1.1e and Website Pro 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an argument to (1) args.cmd or (2) args.bat.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(3) Christey, Cole, Foat<br>Voter Comments:
Christey> DELREF MISC:http://oliver.efri.hr/~crv/security/bugs/NT/buffer.html ADDREF MISC:http://focus.silversand.net/vulner/allbug/buffer.html<br> Frech> XF:website-pro-args-commands(7529)<br>
Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges.
Status:EntryBuffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
Status:CandidateNOOP(2) Cole, Foat<br>Voter Comments:
System Manager sysmgr GUI in SGI IRIX 6.4 and 6.3 allows remote attackers to execute commands by providing a trojan horse (1) runtask or (2) runexec descriptor file, which is used to execute a System Manager Task when the user's Mailcap entry supports the x-sgi-task or x-sgi-exec type.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:sgi-mailcap(809)<br>
Buffer overflow in Elm 2.4 and earlier allows local users to gain privileges via a long TERM environmental variable.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:elm-term-bo(7183)<br>
Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> Possible dupe on CVE-1999-1041.<br> Christey> Possible dupe with CVE-1999-1041.<br>
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:rxvtpipe(425)<br>
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> CONFIRM:http://www.washington.edu/pine/changes.html<br>
mysqld in MySQL 3.21 creates log files with world-readable permissions, which allows local users to obtain passwords for users who are added to the user database.
Status:EntryBuffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file.
Status:EntryBuffer overflow in POP3 server of Admiral Systems EmailClub 1.05 allows remote attackers to execute arbitrary commands via a long "From" header in an e-mail message.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:emailclub-pop3-from-bo(7873)<br>
Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument.
Status:EntryBuffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument.
Status:EntryThe "me" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root.
Status:Entrychroot in Digital Ultrix 4.1 and 4.0 is insecurely installed, which allows local users to gain privileges.
Status:EntryNAI VirusScan NT 4.0.2 does not properly modify the scan.dat virus definition file during an update via FTP, but it reports that the update was successful, which could cause a system administrator to believe that the definitions have been updated correctly.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:virusscan-ftp-update(8387)<br>
Hummingbird Exceed X version 5 allows remote attackers to cause a denial of service via malformed data to port 6000.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:exceed-xserver-dos(7530)<br>
TIOCCONS in SunOS 4.1.1 does not properly check the permissions of a user who tries to redirect console output and input, which could allow a local user to gain privileges.
Status:EntryBuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges.
Status:EntryApache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the "sioux" vulnerability.
Status:EntryVintra SMTP MailServer allows remote attackers to cause a denial of service via a malformed "EXPN *@" command.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
Status:EntryStarTech (1) POP3 proxy server and (2) telnet server allows remote attackers to cause a denial of service via a long USER command.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Multilink PPP for ISDN dialup users in Ascend before 4.6 allows remote attackers to cause a denial of service via a spoofed endpoint identifier.
Status:EntryCheck Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator.
Status:Entrynettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information.
Status:EntrySystemSoft SystemWizard package in HP Pavilion PC with Windows 98, and possibly other platforms and operating systems, installs two ActiveX controls that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via a malicious web page that references (1) the Launch control, or (2) the RegObj control.
Status:CandidateACCEPT(4) Armstrong, Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> XF:systemwizard-modify-registry(7080)<br> Christey> CERT-VN:VU#22919 URL:http://www.kb.cert.org/vuls/id/22919 CERT-VN:VU#34453 URL:http://www.kb.cert.org/vuls/id/34453<br>
Buffer overflow in web-admin tool in NetXRay 2.6 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP request.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Buffer overflow in ping in AIX 4.2 and earlier allows local users to gain root privileges via a long command line argument.
Status:EntryVulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.
Status:Entryxterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Vulnerability in in.telnetd in SunOS 4.1.1 and earlier allows local users to gain root privileges.
Status:CandidateACCEPT(5) Cole, Dik, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Frech> CONFIRM:Sun Microsystems, Inc. Security Bulletin #00106 at http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/1 06&type=0&nav=sec.sba<br> Dik> sun bug: 1054669 1049886 1042370 1033809<br>
Vulnerability in in.rlogind in SunOS 4.0.3 and 4.0.3c allows local users to gain root privileges.
Status:CandidateACCEPT(5) Cole, Dik, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Dik> sun bug: 1054669 1049886 1042370 1033809<br>
Vulnerability in telnet service in HP-UX 10.30 allows attackers to cause a denial of service.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID.
Status:EntryLOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges.
Status:EntryCisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Status:EntryVulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitrary files.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Majordomo 1.94.3 and earlier allows remote attackers to execute arbitrary commands when the advertise or noadvertise directive is used in a configuration file, via shell metacharacters in the Reply-To header.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
dxchpwd in Digital Unix (OSF/1) 3.x allows local users to modify arbitrary files via a symlink attack on the dxchpwd.log file.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.
Status:EntryIIS 3.0 allows remote attackers to cause a denial of service via a request to an ASP page in which the URL contains a large number of / (forward slash) characters.
Status:EntryIMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key.
Status:EntryEthereal allows local users to overwrite arbitrary files via a symlink attack on the packet capture file.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Various modems that do not implement a guard time, or are configured with a guard time of 0, can allow remote attackers to execute arbitrary modem commands such as ATH, ATH0, etc., via a "+++" sequence that appears in ICMP packets, the subject of an e-mail message, IRC commands, and others.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Quake 2 server 3.13 on Linux does not properly check file permissions for the config.cfg configuration file, which allows local users to read arbitrary files via a symlink from config.cfg to the target file.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a source address of 127.0.0.1, which causes the server to attempt to connect to itself.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
IIS 4.0 does not properly restrict access for the initial session request from a user's IP address if the address does not resolve to a DNS domain, aka the "Domain Resolution" vulnerability.
Status:EntryLSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.
Status:CandidateACCEPT(3) Cole, Frech, Wall<br> NOOP(1) Foat<br>Voter Comments:
Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read the information from the status bar when the user moves the mouse over a link.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Wall<br>Voter Comments:
CHANGE> [Foat changed vote from NOOP to ACCEPT]<br>
Internet Anywhere Mail Server 2.3.1 stores passwords in plaintext in the msgboxes.dbf file, which could allow local users to gain privileges by extracting the passwords from msgboxes.dbf.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Buffer overflow in cddbd CD database server allows remote attackers to execute arbitrary commands via a long log message.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Internet Explorer, with a security setting below Medium, allows remote attackers to execute arbitrary commands via a malicious web page that uses the FileSystemObject ActiveX object.
Status:CandidateACCEPT(3) Cole, Frech, Wall<br> NOOP(2) Christey, Foat<br>Voter Comments:
Christey> DELREF MISC:http://oliver.efri.hr/~crv/security/bugs/NT/activex4.html ADDREF MISC:http://focus.silversand.net/vulner/allbug/activex4.html<br> Frech> Change MISC to http://www.securitybugware.org/NT/1018.html<br>
Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges.
Status:EntryIPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
vacm ucd-snmp SNMP server, version 3.52, does not properly disable access to the public community string, which could allow remote attackers to obtain sensitive information.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> http://www.securityfocus.com/archive/1/13130<br>
Direct Mailer feature in Microsoft Site Server 3.0 saves user domain names and passwords in plaintext in the TMLBQueue network share, which has insecure default permissions, allowing remote attackers to read the passwords and gain privileges.
Status:EntryVulnerability in HP Camera component of HP DCE/9000 in HP-UX 9.x allows attackers to gain root privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.
Status:EntryVulnerability in CGI program in the Lasso application by Blue World, as used on WebSTAR and other servers, allows remote attackers to read arbitrary files.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Vulnerability in direct audio user space code on HP-UX 10.20 and 10.10 allows local users to cause a denial of service.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Vulnerability in a certain system call in SCO UnixWare 2.0.x and 2.1.0 allows local users to access arbitrary files and gain root privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
Status:CandidateACCEPT(3) Cole, Frech, Wall<br> MODIFY(1) Meunier<br> NOOP(2) Christey, Foat<br>Voter Comments:
Christey> Need to get feedback from MS on this.<br> Christey> (prompted from Pascal Meunier) should this be treated as a general design issue with ICMP? Or is it a specific implementation flaw that only affects Reliant?<br> Meunier> The description is too narrow and incorrect. Spoofed ICMP redirect messages can be used to setup man-in-the-middle attacks instead of a DoS. There's no reason that this behavior would be limited to Windows, as it is specified by the standard. As I said elsewhere, ICMP messages should not be acted upon without access controls.<br>
Hyperseek allows remote attackers to modify the hyperseek configuration by directly calling the admin.cgi program with an edit_file action parameter.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Oracle Database Assistant 1.0 in Oracle 8.0.3 Enterprise Edition stores the database master password in plaintext in the spoolmain.log file when a new database is created, which allows local users to obtain the password from that file.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Xyplex terminal server 6.0.1S1, and possibly other versions, allows remote attackers to bypass the password prompt by entering (1) a CTRL-Z character, or (2) a ? (question mark).
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
rpc.pwdauthd in SunOS 4.1.1 and earlier does not properly prevent remote access to the daemon, which allows remote attackers to obtain sensitive system information.
Status:EntryMicrosoft Office 98, Macintosh Edition, does not properly initialize the disk space used by Office 98 files and effectively inserts data from previously deleted files into the Office file, which could allow attackers to obtain sensitive information.
Status:EntrymSQL (Mini SQL) 2.0.6 allows remote attackers to obtain sensitive server information such as logged users, database names, and server version via the ServerStats query.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Buffer overflow in Rainbow Six Multiplayer allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long nickname (nick) command.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities.
Status:EntryMetamail before 2.7-7.2 allows remote attackers to overwrite arbitrary files via an e-mail message containing a uuencoded attachment that specifies the full pathname for the file to be modified, which is processed by uuencode in Metamail scripts such as sun-audio-file.
Status:EntryWebRamp M3 router does not disable remote telnet or HTTP access to itself, even when access has been explicitly disabled.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
SMTP server in SLmail 3.1 and earlier allows remote attackers to cause a denial of service via malformed commands whose arguments begin with a "(" (parenthesis) character, such as (1) SEND, (2) VRFY, (3) EXPN, (4) MAIL FROM, (5) RCPT TO.
Status:CandidateACCEPT(3) Cole, Foat, Frech<br> NOOP(1) Wall<br>Voter Comments:
rsh daemon (rshd) generates different error messages when a valid username is provided versus an invalid name, which allows remote attackers to determine valid users on the system.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
KDE file manager (kfm) uses a TCP server for certain file operations, which allows remote attackers to modify arbitrary files by sending a copy command to the server.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Vulnerability in KDE konsole allows local users to hijack or observe sessions of other users by accessing certain devices.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Screen savers in KDE beta 3 allows local users to overwrite arbitrary files via a symlink attack on the .kss.pid file.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Macromedia Dreamweaver uses weak encryption to store FTP passwords, which could allow local users to easily decrypt the passwords of other users.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges.
Status:CandidateACCEPT(4) Cole, Foat, Frech, Stracener<br>Voter Comments:
Squid Internet Object Cache 1.1.20 allows users to bypass access control lists (ACLs) by encoding the URL with hexadecimal escape sequences.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
iPass RoamServer 3.1 creates temporary files with world-writable permissions.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Lotus cc:Mail release 8 stores the postoffice password in plaintext in a hidden file which has insecure permissions, which allows local users to gain privileges.
Status:CandidateACCEPT(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device.
Status:EntryBackWeb client stores the username and password in cleartext for proxy authentication in the Communication registry key, which could allow other local users to gain privileges by reading the password.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
Status:CandidateACCEPT(3) Cole, Foat, Frech<br> NOOP(1) Wall<br>Voter Comments:
An interaction between the AS/400 shared folders feature and Microsoft SNA Server 3.0 and earlier allows users to view each other's folders when the users share the same Local APPC LU.
Status:EntryHummingbird Exceed 6.0.1.0 inadvertently includes a DLL that was meant for development and testing, which logs user names and passwords in cleartext in the test.log file.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Development version of Breeze Network Server allows remote attackers to cause the system to reboot by accessing the configbreeze CGI program.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> There have been no followups to indicate that this issue has been resolved in the production version, and as a benefit to the doubt, this issue transcends EX-BETA until proven otherwise.<br>
RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Opera 3.2.1 allows remote attackers to cause a denial of service (application crash) via a URL that contains an extra / in the http:// tag.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> Will go along with a REJECT if MITRE decides on EX-CLIENT-DOS.<br>
NukeNabber allows remote attackers to cause a denial of service by connecting to the NukeNabber port (1080) without sending any data, which causes the CPU usage to rise to 100% from the report.exe program that is executed upon the connection.
Status:EntryLinux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.
Status:CandidateACCEPT(2) Cole, Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Christey, Cole, Foat<br>Voter Comments:
Christey> CHANGE DESC: "via a symlink attack on the printers temporary file." Add 5.3 as another affected version. MISC:ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX SGI:19961203-02-PX may solve this problem, but the advisory is so vague that it is uncertain whether this was fixed or not. addnetpr is not specifically named in the advisory, which names netprint, which is not specified in the original Bugtraq post. In addition, the date on the advisory is one day earlier than that of the Bugtraq post, though that could be a difference in time zones. It seems plausible that the problem had already been patched (the researcher did say "There *was* [a] race condition") so maybe SGI released this advisory after the problem was publicized. ADDREF BID:330 URL:http://www.securityfocus.com/bid/330 Note: this is a dupe of CVE-1999-1410, but CVE-1999-1410 will be rejected in favor of CVE-1999-1286.<br>
Vulnerability in Analog 3.0 and earlier allows remote attackers to read arbitrary files via the forms interface.
Status:CandidateACCEPT(4) Armstrong, Cole, Frech, Stracener<br> NOOP(2) Foat, Wall<br>Voter Comments:
CHANGE> [Foat changed vote from ACCEPT to NOOP]<br>
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
Status:EntryICQ 98 beta on Windows NT leaks the internal IP address of a client in the TCP data segment of an ICQ packet instead of the public address (e.g. through NAT), which provides remote attackers with potentially sensitive information about the client or the internal network configuration.
Status:CandidateACCEPT(3) Cole, Frech, Wall<br> NOOP(1) Foat<br>Voter Comments:
Frech> Override EX-BETA in this case, since ICQ is always in beta and is widely run in production environments.<br>
Buffer overflow in nftp FTP client version 1.40 allows remote malicious FTP servers to cause a denial of service, and possibly execute arbitrary commands, via a long response string.
Status:EntryTCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
Status:CandidateACCEPT(3) Cole, Frech, Wall<br> NOOP(2) Christey, Foat<br>Voter Comments:
Christey> Need to get feedback from MS on this.<br>
Buffer overflow in web administration feature of Kolban Webcam32 4.8.3 and earlier allows remote attackers to execute arbitrary commands via a long URL.
Status:CandidateACCEPT(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core.
Status:CandidateACCEPT(3) Armstrong, Cole, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:apache-mod-proxy-dos(7249) CONFIRM reference no longer seems to exist. BugTraq message seems to be a confirmation/advisory, however.<br> CHANGE> [Foat changed vote from ACCEPT to NOOP]<br>
Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission.
Status:EntryTransarc DCE Distributed File System (DFS) 1.1 for Solaris 2.4 and 2.5 does not properly initialize the grouplist for users who belong to a large number of groups, which could allow those users to gain access to resources that are protected by DFS.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:dfs-login-groups(7154)<br>
Buffer overflow in Kerberos IV compatibility libraries as used in Kerberos V allows local users to gain root privileges via a long line in a kerberos configuration file, which can be specified via the KRB_CONF environmental variable.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:kerberos-config-file-bo(7184)<br>
cmdtool in OpenWindows 3.0 and XView 3.0 in SunOS 4.1.4 and earlier allows attackers with physical access to the system to display unechoed characters (such as those from password prompts) via the L2/AGAIN key.
Status:EntrySysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.
Status:Entryrcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:rcp-nobody-file-overwrite(7187)<br>
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.
Status:CandidateACCEPT(4) Armstrong, Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF: unicos-accton-read-files(7210)<br>
A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs.
Status:EntryUnspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:sco-pt_chmod(7586)<br>
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:sco-prwarn(7587)<br>
Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:sco-login(7588)<br>
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:sco-at(7589)<br>
Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br> REVIEWING(1) Christey<br>Voter Comments:
Frech> XF:cisco-acl-established(1248) Possibly duplicate with CVE-1999-0162?<br> Christey> Might be a duplicate of CVE-1999-0162, but CVE-1999-0162 was released in 1995, whereas this bug was released in 1992.<br>
Vulnerability in urestore in Novell UnixWare 1.1 allows local users to gain root privileges.
Status:CandidateACCEPT(4) Armstrong, Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF;novell-unixware-urestore-root(7211)<br>
Certain programs in HP-UX 10.20 do not properly handle large user IDs (UID) or group IDs (GID) over 60000, which could allow local users to gain privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:hp-large-uid-gid(7594)<br>
Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option.
Status:Entry** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> REJECT(2) Christey, Frech<br>Voter Comments:
Frech> DUPE CVE-1999-1022<br> Christey> As noted by Andre Frech, this is a duplicate of CVE-1999-1022. The references from this candidate will be added to CVE-1999-1022.<br>
Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:hp-dt-bypass-auth(7668) ACKNOWLEDGED-BY-VENDOR<br>
Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and OpenVMS AXP 1.0, allows local users to gain system privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:openvms-local-privilege-elevation(7142)<br>
Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:bsd-man-command-sequence(7348)<br>
Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:unionfs-mount-ordering(7429)<br>
Vulnerabilities in DECnet/OSI for OpenVMS before 5.8 on DEC Alpha AXP and VAX/VMS systems allow local users to gain privileges or cause a denial of service.
Status:CandidateACCEPT(4) Armstrong, Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:openvms-decnetosi-gain-privileges(7212)<br>
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an attacker to guess.
Status:EntryWindows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device.
Status:Entry/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs.
Status:EntryVulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:irix-object-server(7430)<br>
Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing.
Status:EntryBuffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing.
Status:EntryThe installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
Norton AntiVirus for Internet Email Gateways (NAVIEG) 1.0.1.7 and earlier, and Norton AntiVirus for MS Exchange (NAVMSE) 1.5 and earlier, store the administrator password in cleartext in (1) the navieg.ini file for NAVIEG, and (2) the ModifyPassword registry key in NAVMSE.
Status:CandidateACCEPT(1) Prosser<br> MODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:nav-admin-password(7543)<br> Prosser> This has been since corrected in later releases.<br>
VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing.
Status:EntrySAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup file, which allows local users to gain privileges.
Status:Entrywu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files.
Status:EntryBuffer overflow in linuxconf 1.11r11-rh2 on Red Hat Linux 5.1 allows local users to gain root privileges via a long LANG environmental variable.
Status:Entrylinuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack.
Status:EntryBuffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges.
Status:EntryThe snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf.
Status:Entrynetcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface.
Status:Entrygzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
Status:Entryautomatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded.
Status:EntryMultiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Armstrong, Wall<br>Voter Comments:
Frech> XF:elm-filter-getfilterrules-bo(7214) XF:elm-filter2(711)<br>
snmpd server in cmu-snmp SNMP package before 3.3-1 in Red Hat Linux 4.0 is configured to allow remote attackers to read and write sensitive information.
Status:Entry3Com HiPer Access Router Card (HiperARC) 4.0 through 4.2.29 allows remote attackers to cause a denial of service (reboot) via a flood of IAC packets to the telnet port.
Status:EntryFTP client in Midnight Commander (mc) before 4.5.11 stores usernames and passwords for visited sites in plaintext in the world-readable history file, which allows other local users to gain privileges.
Status:EntryDelegate proxy 5.9.3 and earlier creates files and directories in the DGROOT with world-writable permissions.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:delegate-dgroot-permissions(8438)<br>
Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command.
Status:EntryBuffer overflow in faxalter in hylafax 4.0.2 allows local users to gain privileges via a long -m command line argument.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:hylafax-faxalter-gain-privs(3453) Proper spelling of the product is HylaFAX (see http://www.hylafax.org/)<br>
Linux kernel before 2.3.18 or 2.2.13pre15, with SLIP and PPP options, allows local unprivileged users to forge IP packets via the TIOCSETD option on tty devices.
Status:EntryICQ ActiveList Server allows remote attackers to cause a denial of service (crash) via malformed packets to the server's UDP port.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:icq-activelist-udp-dos(7877)<br>
HTTP server for Xerox DocuColor 4 LP allows remote attackers to cause a denial of service (hang) via a long URL that contains a large number of . characters.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:xerox-docucolor4lp-dos(8041)<br>
Auto_FTP.pl script in Auto_FTP 0.2 stores usernames and passwords in plaintext in the auto_ftp.conf configuration file.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:autoftp-plaintext-password(8045)<br>
Auto_FTP.pl script in Auto_FTP 0.2 uses the /tmp/ftp_tmp as a shared directory with insecure permissions, which allows local users to (1) send arbitrary files to the remote server by placing them in the directory, and (2) view files that are being transferred.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:autoftp-shared-directory(8047)<br>
PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:pam-rlogin-bypass(8315)<br>
Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:xsession-bypass(8316)<br>
Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:linuxconf-pam-shutdown-dos(8437)<br>
NFS daemon (nfsd.exe) for Omni-NFS/X 6.1 allows remote attackers to cause a denial of service (resource exhaustion) via certain packets, possibly with the Urgent (URG) flag set, to port 111.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:xlink-nfsd-dos(8317)<br>
ARCAD Systemhaus 0.078-5 installs critical programs and files with world-writeable permissions, which could allow local users to gain privileges by replacing a program with a Trojan horse.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:arcad-insecure-permissions(8318)<br>
Directory traversal vulnerability in KVIrc IRC client 0.9.0 with the "Listen to !nick <soundname> requests" option enabled allows remote attackers to read arbitrary files via a .. (dot dot) in a DCC GET request.
Status:Entrymknod in Linux 2.2 follows symbolic links, which could allow local users to overwrite files or gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:mknod-symlink(8319)<br>
Nosque MsgCore 2.14 stores passwords in cleartext: (1) the administrator password in the AdmPasswd registry key, and (2) user passwords in the Userbase.dbf data file, which could allow local users to gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:msgcore-plaintext-passwords(8271) BUGTRAQ Reference is actually NTBUGTRAQ.<br>
E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords in cleartext in the files (1) home.fc for version 5.506, (2) network.fc for version 3.5, or (3) FCCLIENT.LOG when logging is enabled.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Frech> (Task 1766)<br> CHANGE> [Frech changed vote from REVIEWING to MODIFY]<br> Frech> XF:firstclass-plaintext-account(9874)<br> Christey> The following reference is for the FCCLIENT.LOG piece: ADDREF NTBUGTRAQ:19990911 Re: SoftArc's FirstClass E-mail Client URL:http://archives.neohapsis.com/archives/ntbugtraq/1999-q3/0189.html<br>
BMC Patrol component, when installed with Compaq Insight Management Agent 4.23 and earlier, or Management Agents for Servers 4.40 and earlier, creates a PFCUser account with a default password and potentially dangerous privileges.
Status:CandidateACCEPT(5) Armstrong, Cole, Foat, Frech, Stracener<br> NOOP(1) Wall<br>Voter Comments:
Compaq Integration Maintenance Utility as used in Compaq Insight Manager agent before SmartStart 4.50 modifies the legal notice caption (LegalNoticeCaption) and text (LegalNoticeText) in Windows NT, which could produce a legal notice that is in violation of the security policy.
Status:EntryNetscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:netscape-cgi-filtering-css(8274)<br>
When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only.
Status:EntryWhen the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.
Status:EntryWindows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.
Status:EntryWindows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:winnt-wins-packet-flood-dos(7329)<br>
Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.
Status:EntryWindows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.
Status:EntryWindows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.
Status:CandidateACCEPT(3) Cole, Foat, Wall<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:nt-threadcontext-dos(7421)<br>
Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default.
Status:EntryPegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:pegasus-weak-password-encryption(8430)<br>
Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users.
Status:CandidateNOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2283)<br>
AV Option for MS Exchange Server option for InoculateIT 4.53, and possibly other versions, only scans the Inbox folder tree of a Microsoft Exchange server, which could allow viruses to escape detection if a user's rules cause the message to be moved to a different mailbox.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:inoculate-message-redirect-bypass(5602)<br>
Real Media RealServer (rmserver) 6.0.3.353 stores a password in plaintext in the world-readable rmserver.cfg file, which allows local users to gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:realserver-insecure-password(7544)<br>
The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:ie-ie5setup-disable-password(7545)<br>
Buffer overflow in /usr/bin/write in Solaris 2.6 and 7 allows local users to gain privileges via a long string in the terminal name argument.
Status:CandidateACCEPT(2) Cole, Dik<br> MODIFY(1) Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Frech> XF:solaris-write-bo(7546)<br> Christey> This appears to be a rediscovery of the problem for Solaris 2.8: BUGTRAQ:20011114 /usr/bin/write (solaris2.x) Segmentation Fault URL:http://marc.theaimsgroup.com/?l=bugtraq&m=100588255815773&w=2<br> Dik> sun bug: 4218941<br>
Triactive Remote Manager with Basic authentication enabled stores the username and password in cleartext in registry keys, which could allow local users to gain privileges.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:triactive-remote-basic-auth(7548)<br>
FORE PowerHub before 5.0.1 allows remote attackers to cause a denial of service (hang) via a TCP SYN scan with TCP/IP OS fingerprinting, e.g. via nmap.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:powerhub-nmap-dos(7556)<br>
perlshop.cgi shopping cart program stores sensitive customer information in directories and files that are under the web root, which allows remote attackers to obtain that information via an HTTP request.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:perlshop-cgi-obtain-information(7557)<br>
FileSystemObject (FSO) in the showfile.asp Active Server Page (ASP) allows remote attackers to read arbitrary files by specifying the name in the file parameter.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(3) Christey, Foat, Wall<br>Voter Comments:
Frech> XF:iis-fso-read-files(7558)<br> Christey> Explicitly mention IIS<br>
Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands.
Status:CandidateACCEPT(1) Wall<br> MODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:frontpage-ext-fpcount-crash(5494)<br>
Matt Wright's download.cgi 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:download-cgi-directory-traversal(8279)<br>
dbmlparser.exe CGI guestbook program does not perform a chroot operation properly, which allows remote attackers to read arbitrary files.
Status:CandidateNOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2284)<br>
DNS allows remote attackers to use DNS name servers as traffic amplifiers via a UDP DNS query with a spoofed source address, which produces more traffic to the victim than was sent by the attacker.
Status:EntrySymantec Norton Utilities 2.0 for Windows 95 marks the TUNEOCX.OCX ActiveX control as safe for scripting, which allows remote attackers to execute arbitrary commands via the run option through malicious web pages that are accessed by browsers such as Internet Explorer 3.0.
Status:EntryBuffer overflow in dbadmin CGI program 1.0.1 on Linux allows remote attackers to execute arbitrary commands.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setuid root program.
Status:Entry(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable.
Status:CandidateNOOP(2) Cole, Foat<br>Voter Comments:
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Status:EntryBuffer overflow in ppp program in FreeBSD 2.1 and earlier allows local users to gain privileges via a long HOME environment variable.
Status:EntryPerl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
Status:EntryWindows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.
Status:CandidateACCEPT(1) Cole<br> NOOP(1) Foat<br>Voter Comments:
passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument.
Status:CandidateACCEPT(1) Dik<br> NOOP(2) Cole, Foat<br>Voter Comments:
Dik> sun bug: 1171499<br>
US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:3com-netserver-filter-bypass(7330)<br>
suidexec in suidmanager 0.18 on Debian 2.0 allows local users to gain root privileges by specifying a malicious program on the command line.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:suidmanager-suidexec-root-privileges(7304)<br>
Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:nextstep-npd-root-access(7143)<br>
Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:nextstep-restore09-root-access(7144)<br>
Control Panel "Password Security" option for Apple Powerbooks allows attackers with physical access to the machine to bypass the security by booting it with an emergency startup disk and using a disk editor to modify the on/off toggle or password in the aaaaaaaAPWD file, which is normally inaccessible.
Status:CandidateNOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2285)<br>
BSD 4.4 based operating systems, when running at security level 1, allow the root user to clear the immutable and append-only flags for files by unmounting the file system and using a file system editor such as fsdb to directly modify the file through a device.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2286)<br>
Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> XF:vms-monitor-gain-privileges(7136) Duplicate of CVE-1999-1056? If not, indicate why in Analysis comments.<br> Christey> Note that CVE-1999-1056<br> Christey> CVE-1999-1056 is in fact a duplicate. This candidate will be kept, and CVE-1999-1056 will be REJECTed, because this candidate has more references.<br>
Vulnerability in integer multiplication emulation code on SPARC architectures for SunOS 4.1 through 4.1.2 allows local users to gain root access or cause a denial of service (crash).
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(1) Wall<br>Voter Comments:
Frech> XF:sun-integer-multiplication-access(7150)<br> Dik> sun bug: 1069072 1071053<br>
Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed.
Status:EntryVulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> XF:irix-xfsdump-symlink(7193)<br>
spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(1) Foat<br>Voter Comments:
Frech> XF:spaceware-hostname-command-execution(7194)<br>
The Economist screen saver 1999 with the "Password Protected" option enabled allows users with physical access to the machine to bypass the screen saver and read files by running Internet Explorer while the screen is still locked.
Status:CandidateACCEPT(1) Wall<br> NOOP(2) Cole, Foat<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2287) CONFIRM NTBUGTRAQ:19990604 Official response from The Economist re: 1999 Screen Saver<br>
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:irix-searchbook-permissions(7575)<br>
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.
Status:EntryIBM/Tivoli OPC Tracker Agent version 2 release 1 creates files, directories, and IPC message queues with insecure permissions (world-readable and world-writable), which could allow local users to disrupt operations and possibly gain privileges by modifying or deleting files.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
IBM/Tivoli OPC Tracker Agent version 2 release 1 allows remote attackers to cause a denial of service (resource exhaustion) via malformed data to the localtracker client port (5011), which prevents the connection from being closed properly.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:aix-snap-insecure-tmp(7560)<br>
dumpreg in Red Hat Linux 5.1 opens /dev/mem with O_RDWR access, which allows local users to cause a denial of service (crash) by redirecting fd 1 (stdout) to the kernel.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br>Voter Comments:
ifdhcpc-done script for configuring DHCP on Red Hat Linux 5 allows local users to append text to arbitrary files via a symlink attack on the dhcplog file.
Status:EntryVulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Christey, Cole, Foat<br>Voter Comments:
Frech> XF: aix-hpux-connect-dos(7195)<br> Christey> BUGTRAQ:19970307 Re: Bug in connect() ? URL:http://www.securityfocus.com/archive/1/Pine.HPP.3.92.970307195408.12139B-100000@wpax13.physik.uni-wuerzburg.de BUGTRAQ:19970311 Re: Bug in connect() for aix 4.1.4 ? URL:http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=6419<br>
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
Status:Entryaddnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
Status:CandidateNOOP(2) Cole, Foat<br> REJECT(2) Christey, Frech<br>Voter Comments:
Christey> DUPE CVE-1999-1286 Need to add these references to CVE-1999-1286<br>
The installation of the fsp package 2.71-10 in Debian GNU/Linux 2.0 adds the anonymous FTP user without notifying the administrator, which could automatically enable anonymous FTP on some servers such as wu-ftp.
Status:EntryA possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes.
Status:CandidateNOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2288)<br>
Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.
Status:CandidateMODIFY(2) Dik, Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:solaris-coredump-symlink(7196)<br> Dik> sun bug: 1208241 Also applies to set-uid executables that have made real and effective uid identical<br>
IBM Netfinity Remote Control allows local users to gain administrator privileges by starting programs from the process manager, which runs with system level privileges.
Status:EntryVulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges.
Status:CandidateACCEPT(3) Cole, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> XF:bsd-binmail(515) CA-1991-13 was superseded by CA-1995-02.<br> Christey> Is there overlap between CVE-1999-1415 and CVE-1999-1438? Both CERT advisories are vague.<br>
AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service (resource exhaustion) via an HTTP POST request with a large content-length.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTTP request, which is improperly logged.
Status:CandidateACCEPT(1) Dik<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Dik> sun bug: 4218283<br>
ICQ99 ICQ web server build 1701 with "Active Homepage" enabled generates allows remote attackers to determine the existence of files on the server by comparing server responses when a file exists ("404 Forbidden") versus when a file does not exist ("404 not found").
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF;icq-webserver-gain-information(8229) CONFIRM:http://online.securityfocus.com/archive/1/13655<br>
Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges.
Status:EntryNBase switches NH2012, NH2012R, NH2015, and NH2048 have a back door password that cannot be disabled, which allows remote attackers to modify the switch's configuration.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br>Voter Comments:
NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software updates to modify the switch or cause a denial of service (crash) by guessing the target filenames, which have default names.
Status:CandidateACCEPT(2) Cole, Foat<br> NOOP(1) Wall<br>Voter Comments:
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:linux-path-execute-commands(7561)<br>
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i.
Status:EntrySolaris Solstice AdminSuite (AdminSuite) 2.1 uses unsafe permissions when adding new users to the NIS+ password table, which allows local users to gain root access by modifying their password table entries.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-adminsuite-nisplus-password(7467)<br> Dik> sun bug:1237225<br>
Solaris Solstice AdminSuite (AdminSuite) 2.1 incorrectly sets write permissions on source files for NIS maps, which could allow local users to gain privileges by modifying /etc/passwd.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-adminsuite-password-map-permissions(7468)<br> Dik> 1236787<br>
Solaris Solstice AdminSuite (AdminSuite) 2.1 follows symbolic links when updating an NIS database, which allows local users to overwrite arbitrary files.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-adminsuite-symlink(7469)<br> Dik> sun bug: 1262888<br>
Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 create lock files insecurely, which allows local users to gain root privileges.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-adminsuite-lock-file(7470)<br> Dik> sun bug: 1262888<br>
Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 allows local users to gain privileges via the save option in the Database Manager, which is running with setgid bin privileges.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br>Voter Comments:
Frech> XF:solaris-adminsuite-database-manager(7471)<br> Dik> sun bug: 4005611<br>
DIT TransferPro installs devices with world-readable and world-writable permissions, which could allow local users to damage disks through the ff device driver.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:transferpro-devices-insecure-permissions(7305)<br>
PIM software for Royal daVinci does not properly password-protext access to data stored in the .mdb (Microsoft Access) file, which allows local users to read the data without a password by directly accessing the files with a different application, such as Access.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:davinci-pim-access-information(7562)<br>
ZAK in Appstation mode allows users to bypass the "Run only allowed apps" policy by starting Explorer from Office 97 applications (such as Word), installing software into the TEMP directory, and changing the name to that for an allowed application, such as Winword.exe.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:zak-bypass-restrictions(7563)<br>
Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges.
Status:EntryHP JetAdmin D.01.09 on Solaris allows local users to change the permissions of arbitrary files via a symlink attack on the /tmp/jetadmin.log file.
Status:Entrylogin in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables.
Status:CandidateACCEPT(1) Cole<br> NOOP(2) Foat, Wall<br>Voter Comments:
Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "user" parameter.
Status:CandidateNOOP(3) Cole, Foat, Wall<br>Voter Comments:
ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml.
Status:EntryVulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments.
Status:CandidateACCEPT(4) Cole, Dik, Foat, Stracener<br> MODIFY(1) Frech<br> NOOP(2) Christey, Wall<br>Voter Comments:
Frech> XF:bsd-binmail(515)<br> Dik> sun bug: 1047340<br> Christey> Is there overlap between CVE-1999-1415 and CVE-1999-1438? Both CERT advisories are vague.<br>
gcc 2.7.2 allows local users to overwrite arbitrary files via a symlink attack on temporary .i, .s, or .o files.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:gnu-gcc-tmp-symlink(7338)<br>
Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client.
Status:CandidateACCEPT(1) Cole<br> MODIFY(1) Frech<br> NOOP(2) Foat, Wall<br>Voter Comments:
Frech> XF:icq-long-filename(7564)<br>
Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:linux-sigio-dos(7339)<br>
Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:linux-k6-dos(7340)<br>
Micah Software Full Armor Network Configurator and Zero Administration allow local users with physical access to bypass the desktop protection by (1) using <CTRL><ALT><DEL> and kill the process using the task manager, (2) booting the system from a separate disk, or (3) interrupting certain processes that execute while the system is booting.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:full-armor-protection-bypass(7341)<br>
genkey utility in Alibaba 2.0 generates RSA key pairs with an exponent of 1, which results in transactions that are sent in cleartext.
Status:CandidateNOOP(3) Cole, Foat, Wall<br> REVIEWING(1) Frech<br>Voter Comments:
Frech> (Task 2290)<br>
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
Status:CandidateMODIFY(1) Frech<br> NOOP(3) Cole, Foat, Wall<br>Voter Comments:
Frech> XF:linux-imapd-ipop3d-dos(7345)<br>
Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the "Clear History" option, and are not visible when the user browses the folders because of tailored displays.
Status:CandidateMODIFY(1) Frech<br> NOOP(2) Cole, Foat<br>Voter Comments:
Frech> XF:http-ie-record(524) In description, URL's should be URLs.<br>
Internet Explorer 4.0 allows remote attackers to cause a denial of service (crash) via HTML code that contains a long CLASSID parameter in an OBJECT tag.
Status:CandidateACCEPT(2) Cole, Wall<br> NOOP(2) Christey, Foat<br>Voter Comments:
Christey> BUGTRAQ:19980730 Re: Object tag crashes Internet Explorer 4.0 URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221104526188&w=2<br>
Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user's mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fau