[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

VOTE SUMMARY: active candidates in CERT and VEN-* clusters



The following candidates have not yet reached the Final Decision
phase.  They are from the CERT and VEN-* clusters.  A short voting
summary is provided, along with voters' comments for each candidate.
Some of these candidates may be examined more closely during the CVE
Review meetings.

Many of these touch on content issues that we've discussed recently,
especially the Same Codebase.  Such candidates will remain in the
Proposal phase until we can cleanly address the issue of what
constitutes "same codebase" and what to do if we can't be certain.
Others would require a significant change to the description, or even
a RECAST.

- Steve


=================================
Candidate: CAN-1999-0004
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.10.mime_buffer_overflows
Reference: XF:outlook-long-name
Reference: SUN:00175
Reference: MS:MS98-008

MIME buffer overflow in email clients, e.g. Solaris mailtool
and Outlook.

Modifications:
  ADDREF MS:MS98-008
  DESC include Outlook

VOTES:
   ACCEPT(2) Northcutt, Landfield
   MODIFY(1) Frech
   REVIEWING(1) Shostack

COMMENTS:
 Frech> Extremely minor, but I believe e-mail is the correct term. (If you reject
 Frech> this suggestion, I will not be devastated.) :-)


=================================
Candidate: CAN-1999-0005
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.09.imapd
Reference: XF:imap-authenticate-bo
Reference: SUN:00177

Arbitrary command execution via IMAP buffer overflow, as in
CERT:CA-98.09.imapd.

VOTES:
   ACCEPT(4) Hill, Shostack, Frech, Wall
   MODIFY(1) Christey
   REVIEWING(1) Northcutt

COMMENTS:
 Northcutt> there are multiple similar exploits which may imply
 Northcutt> multiple vulnerabilties
 Christey> It's difficult to distinguish between this vulnerability and another
 Christey> IMAP vulnerability via just the textual description.  (The other
 Christey> vulnerability is CVE-00042, not yet proposed as a candidate for some
 Christey> odd reason).  I had to reference the different CERT advisories to
 Christey> distinguish between this candidate and CVE-00042.  The X-Force
 Christey> database says that "[the CVE-00042 vulnerability is in] the IMAP LOGIN
 Christey> command whereas [CAN-1999-0005] affects the IMAP AUTHENTICATE
 Christey> command."  I propose modifying the description to say something to
 Christey> this effect, though the typical analyst may still need to rely on the
 Christey> references.


=================================
Candidate: CAN-1999-0014
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-98.02.CDE
Reference: SUN:00185

Unauthorized privileged access or denial of service via dtappgather
program in CDE.

VOTES:
   ACCEPT(2) Hill, Wall
   MODIFY(1) Frech
   NOOP(1) Northcutt
   REJECT(1) Shostack

COMMENTS:
 Shostack> we have insufficient data if a new CDE dtappgather bug
 Shostack> comes out to determine if its new or a re-invention.
 Frech> Reference: XF:cde-dtappgather


=================================
Candidate: CAN-1999-0017
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.27.FTP_bounce
Reference: XF:ftp-bounce
Reference: XF:ftp-privileged-port

FTP bounce attack to connect to arbitrary ports on machines other than
the FTP client.

VOTES:
   ACCEPT(3) Hill, Frech, Wall
   MODIFY(1) Northcutt
   NOOP(1) Shostack
   REVIEWING(1) Christey

COMMENTS:
 Northcutt> the primary vulnerability is in some FTP server implementations
 Northcutt> that allow this as opposed to the actual connecting to the ports
 Christey> I think Steve Northcutt makes a good point.  The description needs to
 Christey> be modified.


=================================
Candidate: CAN-1999-0018
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.26.statd
Reference: XF:statd
Reference: AUSCERT:AA-97.29

Buffer overflow in statd allows root privileges.

Modifications:
  DESC remove CERT advisory from text

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0032
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.19.bsdlp
Reference: AUSCERT:AA-96.12
Reference: XF:bsd-lprbo2
Reference: CIAC:I-042
Reference: SGI:19980402-01-PX

Command execution in BSD-based lpr package (lp) due to buffer
overflow.

VOTES:
   ACCEPT(3) Northcutt, Hill, Wall
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> the mention of (lp) is misleading.  The problem was with
 Shostack> the BSD lpr family, not the SYSV lp family.
 Frech> References: XF:bsd-lprbo
 Frech> References: XF:lpr-bo


=================================
Candidate: CAN-1999-0033
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.18.at
Reference: SUN:00160
Reference: XF:sun-atbo

Command execution in Sun systems via buffer overflow in the at program

VOTES:
   ACCEPT(4) Northcutt, Hill, Shostack, Wall
   RECAST(1) Frech

COMMENTS:
 Frech> This vulnerability also manifests itself for the following =
 Frech> platforms: AIX, HPUX, IRIX, Solaris, SCO, NCR MP-RAS. In this light,
 Frech> please add the = following:
 Frech> Reference: XF:at-bo


=================================
Candidate: CAN-1999-0035
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ftp-ftpd
Reference: CERT:CA-97.16.ftpd
Reference: AUSCERT:AA-97.03

Race condition in signal handling routine in ftpd, allowing read/write
arbitrary files.

Modifications:
  ADDREF XF:ftp-ftpd

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0046
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-97.06.rlogin-term
Reference: XF:rlogin-termbo

Buffer overflow of rlogin program using TERM environmental variable

Modifications:
  DELREF XF:bsdi-rlogind
  ADDREF XF:rlogin-termbo

VOTES:
   ACCEPT(3) Shostack, Northcutt, Landfield
   MODIFY(1) Frech

COMMENTS:
 Frech> Every sentence is followed by a period (unless you are a criminal,
 Frech> and then it follows with an appeal.)


=================================
Candidate: CAN-1999-0052
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: FreeBSD:FreeBSD-SA-98:08

IP fragmentation denial of service in FreeBSD

VOTES:
   MODIFY(2) Northcutt, Shostack
   NOOP(1) Hill

COMMENTS:
 Northcutt> Do we want to treat each instantiation of common attacks
 Northcutt> separately for each OS?  Fragmentation and denial of service is
 Northcutt> not a freebsd specific issue, over the years we have seen:
 Northcutt>
 Northcutt> "Pathological" fragmentation where the second packet move the pointer
 Northcutt> negative and then we scribble on our stack, this is the teardrop
 Northcutt> approach if I remember the exploit name correctly and uses UDP.
 Northcutt>
 Northcutt> We also have the classic memory wasting frag attack where they
 Northcutt> send the first part and never finish, then send a new first
 Northcutt> part and so on.
 Northcutt>
 Northcutt> I think frag attack was in the cisco set, if not it should be
 Northcutt> there is a nice attack for IOS
 Northcutt>
 Northcutt> Then you have the how_do_you_handles such as Dug Song's
 Northcutt> frag router to evade IDS systems and whatever the heck
 Northcutt> this loki like thing that is all the rage for the last
 Northcutt> 90 days or so.
 Northcutt>
 Northcutt> Recommend: MODIFY 52 so that the text blurb at least hints
 Northcutt> why this is a unique case of mishandling frags OR create
 Northcutt> general frag vulnerabilities.
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.


=================================
Candidate: CAN-1999-0053
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: FreeBSD:FreeBSD-SA-98:07

TCP RST denial of sevice in FreeBSD

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Shostack

COMMENTS:
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.


=================================
Candidate: CAN-1999-0055
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00172
Reference: RSI:RSI.0005.05-14-98.SUN.LIBNSL
Reference: XF:sun-libnsl

Buffer overflows in Sun libnsl allow root access.

VOTES:
   ACCEPT(2) Northcutt, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> This vulnerability also affects other OSes, i.e. AIX 4.3 that have
 Prosser> ported versions of Sun's libnsl.a
 Prosser> ref: IBM AIX RS6000 APAR number IX80543


=================================
Candidate: CAN-1999-0057
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SNI:SNI-19
Reference: XF:vacation
Reference: HP:HPSBUX9811-087

Vacation program allows command execution by remote users through
a sendmail command.

VOTES:
   ACCEPT(2) Frech, Hill
   MODIFY(1) Shostack
   NOOP(1) Northcutt

COMMENTS:
 Shostack> Problem 1: SNI-19 is SNI-19.BSD.lpd.vulnerabilities update according
 Shostack> to http://geek-girl.com/bugtraq/1997_4/0106.html
 Shostack>
 Shostack> Problem 2: Wording is unclear.  Is this a vacation problem, a
 Shostack> .vacation problem, or a sendmail problem?


=================================
Candidate: CAN-1999-0065
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00181
Reference: XF:hp-dtmail

Bug in how dtmail handles attachments allows remote attacker to
execute commands with the same privileges as the user who is
reading the message.

VOTES:
   ACCEPT(2) Northcutt, Frech
   MODIFY(1) Prosser

COMMENTS:
 Prosser> This is a multiple buffer overflow vulnerability in Sun's CDE in how
 Prosser> dtmail handles attachments.


=================================
Candidate: CAN-1999-0067
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.06.cgi_example_code
Reference: XF:http-cgi-phf

CGI phf program allows remote command execution

VOTES:
   ACCEPT(4) Hill, Shostack, Frech, Wall
   MODIFY(2) Northcutt, Christey

COMMENTS:
 Northcutt> this is not about phf it is about escape_shell_cmd(),
 Northcutt> you had the same thing with php and so forth.
 Christey> I agree with Adam that "shell metacharacters" is too high a level of
 Christey> abstraction.  I believe that phf and php and the others should be
 Christey> distinguished.  However, it might be better to change the description
 Christey> to say "CGI phf program allows remote command execution via shell
 Christey> metacharacters."


=================================
Candidate: CAN-1999-0078
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.08.pcnfsd
Reference: XF:rpc-pcnfsd

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions,
or execute arbitrary commands through arguments in the RPC call.

Modifications:
  DELREF XF:nfs-pcnfsd

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield
   RECAST(1) Christey

COMMENTS:
 Christey> This candidate should be SPLIT, since there are two separate
 Christey> software flaws.  One is a symlink race and the other is a
 Christey> shell metacharacter problem.


=================================
Candidate: CAN-1999-0086
Published:
Final-Decision:
Interim-Decision: 19990630
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: ERS:ERS-SVA-E01-1998:001.1
Reference: XF:ibm-routed

AIX routed allows remote users to modify sensitive files.

Modifications:
  ADDREF XF:ibm-routed

VOTES:
   ACCEPT(2) Shostack, Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> Reference: XF:ibm-routed
 Prosser> This vulnerability allows debug mode to be turned on which is
 Prosser> the problem.  Should this be more specific in the description? This
 Prosser> one also affects SGI OSes, ref SGI Security Advisory 19981004-PX which
 Prosser> is in the SGI cluster, shouldn't these be cross-referenced as the same
 Prosser> vuln affects multiple OSes.


=================================
Candidate: CAN-1999-0088
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: ERS:ERS-SVA-E01-1998:004.1

IRIX and AIX automountd services (autofsd) allow remote users to
execute root commands.

VOTES:
   ACCEPT(2) Shostack, Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> ERS (and other references, BTW) explicitly stipulate 'local and
 Frech> remote'.
 Frech> Reference: XF:irix-autofsd
 Prosser> Include the SGI Alert as well since it is mentioned in the
 Prosser> description.
 Prosser> SGI Security Advisory 19981005-01-PX


=================================
Candidate: CAN-1999-0089
Published:
Final-Decision:
Interim-Decision: 19990630
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: ERS:ERS-SVA-E01-1997:005.1
Reference: XF:ibm-libDtSvc

Buffer overflow in AIX libDtSvc library can allow local users
to gain root access.

Modifications:
  ADDREF XF:ibm-libDtSvc

VOTES:
   ACCEPT(2) Shostack, Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> Reference: XF:ibm-libDtSvc
 Prosser> The overflow is in the dtaction utility.  Also affects
 Prosser> dtaction in the CDE on versions of SunOS (SUN 164). Probably should be
 Prosser> specific.


=================================
Candidate: CAN-1999-0097
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: ERS:ERS-SVA-E01-1997:009.1

The AIX FTP client can be forced to execute commands from a malicious
server through shell metacharacters, i.e. in files whose name begins with a
pipe character.

VOTES:
   ACCEPT(2) Shostack, Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Northcutt> Per 97, general issue of mishandling metachars is a lot
 Northcutt> like my comment about CGI-BINs (not just PHF) [Someone]
 Northcutt> recently did a content search for about
 Northcutt> CGI-BIN and /etc/passwd and found about 10 cig programs
 Northcutt> that someone attempted to exploit...  However we resolve the
 Northcutt> CGI-BIN bit, we ought to consider applying the same logic to
 Northcutt> candidates like 97.
 Frech> Reference: XF:ibm-ftp
 Prosser> Concur with Adam's modification


=================================
Candidate: CAN-1999-0099
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-95.13.syslog.vul
Reference: XF:smtp-syslog

A buffer overflow in the syslog utility allows remote execution
through Sendmail and possibly other mail servers.

Modifications:
  DESC could be through other mailers besides Sendmail

VOTES:
   ACCEPT(3) Frech, Northcutt, Landfield
   MODIFY(1) Shostack

COMMENTS:
 Shostack> Anything that passes bad data to syslog might be used to proxy this,
 Shostack> not just mail servers.


=================================
Candidate: CAN-1999-0121
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00164
Reference: ERS:ERS-SVA-E01-1997:005.1

Buffer overflow in dtaction command gives root access.

VOTES:
   ACCEPT(1) Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> Reference: XF:dtaction-bo
 Frech> Reference: XF:sun-dtaction
 Prosser> Buffer overflow also affects /usr/dt/bin/dtaction in libDtSvc.a
 Prosser> library in AIX 4.x, but reference for this Sun vulnerability should
 Prosser> only reflect the Sun Bulletin or the CIAC I-032 version of the Sun
 Prosser> Bulletin


=================================
Candidate: CAN-1999-0128
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:ping-death
Reference: CERT:CA-96.26.ping

Oversized ICMP ping packets can result in a denial of service,
aka Ping o' Death.

Modifications:
  ADDREF XF:ping-death
  COMMENT Andre's other suggested ref's were for a buffer overflow
  COMMENT in the ping program, which is a different vulnerability.
  DESC slight wording change to identify this as Ping o' Death *only*

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0129
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.25.sendmail_groups

Sendmail allows local users to write to a file and gain group
permissions via a .forward or :include: file.

VOTES:
   ACCEPT(4) Northcutt, Hill, Shostack, Wall
   REVIEWING(1) Frech

COMMENTS:
 Frech> PENDING. NEEDS RESEARCH.


=================================
Candidate: CAN-1999-0132
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:expreserve
Reference: CERT:CA-96.19.expreserve

Expreserve, used in vi and ex, allows local users to overwrite
arbitrary files and gain root access.

Modifications:
  ADDREF XF:expreserve

VOTES:
   ACCEPT(4) Frech, Shostack, Northcutt, Landfield


=================================
Candidate: CAN-1999-0142
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: CERT:CA-96.05.java_applet_security_mgr

Java Applet Security Manager allows an applet to connect to arbitrary
hosts.

VOTES:
   ACCEPT(3) Hill, Shostack, Wall
   MODIFY(1) Frech
   RECAST(1) Northcutt
   REVIEWING(1) Christey

COMMENTS:
 Northcutt> Please note I am not a Java expert, but I think jdk 2.0 and
 Northcutt> so forth do not have a sandbox notion and applets (perhaps trusted
 Northcutt> applets) can connect to arbitrary hosts as a matter of course.  You
 Northcutt> might want to contact Li Gong (li.gong@sun.com) or a similar
 Northcutt> expert before issuing this one.  NOTE: another reason to consider
 Northcutt> the original date!!!
 Christey> Noting Steve Northcutt's comments, perhaps we would need to modify the
 Christey> description somewhat to distinguish between current Java versions and
 Christey> the one that had this vulnerability.  However, the CERT reference
 Christey> associates a general place and time for where this vulnerability
 Christey> arose, so I don't think it's too big of a deal.
 Frech> Reference: XF:http-java-appletsecmgr


=================================
Candidate: CAN-1999-0185
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00156

In Solaris, a remote user could connect from an FTP server's
data port to an rlogin server on a host that trusts the FTP server,
allowing remote command execution.

VOTES:
   ACCEPT(2) Northcutt, Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> Also reported as vulnerable on SunOS, which is similar, but different.
 Frech> Reference: XF:sun-ftpd/logind


=================================
Candidate: CAN-1999-0190
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00167

Solaris rpcbind can be exploited to overwrite arbitrary files and gain
root access.

VOTES:
   ACCEPT(1) Northcutt
   MODIFY(2) Frech, Prosser

COMMENTS:
 Frech> Reference: XF:sun-rpcbind
 Prosser> The way rpcbind handles indirect calls is vulnerable in this advisory.
 Prosser> As there are lots of rpcbind problems, maybe should be more specific?


=================================
Candidate: CAN-1999-0207
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:majordomo-exe
Reference: CERT:CA-94.11.majordomo.vulnerabilities

Remote attacker can execute commands through Majordomo using the
Reply-To field and a "lists" command.

VOTES:
   ACCEPT(4) Northcutt, Hill, Shostack, Wall
   REVIEWING(1) Frech

COMMENTS:
 Frech> PENDING. NEEDS RESEARCH.


=================================
Candidate: CAN-1999-0208
Published:
Final-Decision:
Interim-Decision:
Modified: 19990621-01
Announced: 19990607
Assigned: 19990607
Category: SF
Reference: XF:rpc-update
Reference: CERT:CA-95.17.rpc.ypupdated.vul

rpc.ypupdated (NIS) allowed remote users to execute arbitrary commands.

Modifications:
  ADDREF XF:rpc-update

VOTES:
   ACCEPT(3) Shostack, Northcutt, Landfield
   MODIFY(1) Frech

COMMENTS:
 Frech> "allows remote users..." since this vuln's context pertains to
 Frech> when the service was vulnerable.


=================================
Candidate: CAN-1999-0212
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00168

rpc.mountd in Linux and Solaris would generate error messages that
allowed an attacker to determine what files were on the server.

VOTES:
   ACCEPT(1) Prosser
   MODIFY(2) Northcutt, Frech

COMMENTS:
 Northcutt> I am concerned that Linux is becoming too
 Northcutt> non descript a word, in the past two weeks I have run
 Northcutt> across 3 Linuxes I had never heard of before.  I think we need
 Northcutt> to start being specific when we mention Linux either by
 Northcutt> the kernal or vendor or something.
 Frech> Reference: XF:sun-mountd


=================================
Candidate: CAN-1999-0328
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SGI:19971103-01-PX

SGI permissions program allows local users to gain root privileges.

VOTES:
   ACCEPT(1) Northcutt
   MODIFY(2) Shostack, Frech

COMMENTS:
 Shostack> include a path to /usr/bin/permissions to clarify that it is a
 Shostack> program.
 Frech> Reference: XF:sgi-permtool


=================================
Candidate: CAN-1999-0358
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: BUGTRAQ:Jan29,1999
Reference: COMPAQ:SSRT0583U

Digital Unix 4.0 has a buffer overflow in the inc program of the mh
package.

VOTES:
   ACCEPT(3) Shostack, Northcutt, Hill
   MODIFY(2) Prosser, Frech

COMMENTS:
 Prosser> Ref'd SSRT has an 'at' vulnerable as well supposedly fixed by
 Prosser> the patch.  Shouldn't this be included as a seperate CVE in this
 Prosser> cluster. ref:BugTraq "Digital Unix Buffer Overflows: Exploits" from
 Prosser> Lamont Granquist for both as well.
 Frech> Reference: XF:du-inc


=================================
Candidate: CAN-1999-0370
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: SUN:00184

In Sun Solaris and SunOS, man and catman contain vulnerabilities
that allow overwriting arbitrary files.

VOTES:
   ACCEPT(2) Northcutt, Prosser
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:sun-man


=================================
Candidate: CAN-1999-0396
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: NETBSD:1999-001
Reference: OPENBSD:Feb17,1999

A race condition between the select() and accept() calls in NetBSD TCP
servers allows remote attackers to cause a denial of service.

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Shostack

COMMENTS:
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.


=================================
Candidate: CAN-1999-0485
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: OPENBSD:Feb19,1999

Remote attackers can cause a denial of service through ipintr() in ipq
in OpenBSD.

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Shostack

COMMENTS:
 Shostack> For denial of service attacks, we should distinguish between
 Shostack> host availability, service, and CPU absorbtion DOS attacks.


=================================
Candidate: CAN-1999-0513
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990607
Assigned: 19990607
Category: CF
Reference: CERT:CA-98.01.smurf
Reference: FreeBSD:FreeBSD-SA-98:06
Reference: XF:smurf

ICMP messages to broadcast addresses are allowed, allowing for a
Smurf attack that can cause a denial of service.

VOTES:
   ACCEPT(4) Hill, Shostack, Frech, Wall
   MODIFY(1) Northcutt
   REVIEWING(1) Christey

COMMENTS:
 Northcutt> If you put it this way then ping mapping becomes part of smurf.  I
 Northcutt> would consider calling the vulnerability ICMP to broadcast addresses
 Northcutt> and in the text state allowing for a Smurf denial or service or ICMP
 Northcutt> ping mapping to acquire intelligence data about a network.
 Christey> This one is an interesting case.  As Steve noted, this configuration
 Christey> problem could allow for ping mapping as well.  I think the distinction
 Christey> is that for Smurf, there's a forged source IP address, and that's
 Christey> generally not the case when you're doing ping mapping.  So do we have
 Christey> a single vulnerability (ICMP to broadcast) with 2 separate
 Christey> implications?  Or, do we have two separate vulnerabilities, where one
 Christey> accounts for the "design flaw" of spoofed IP addresses and another one
 Christey> is a vulnerability because it allows information gathering?


=================================
Candidate: CAN-1999-0551
Published:
Final-Decision:
Interim-Decision:
Modified:
Announced: 19990617
Assigned: 19990607
Category: CF
Reference: HP:HPSBUX9804-078
Reference: XF:hp-openmail

HP OpenMail can be misconfigured to allow users to run arbitrary
commands using malicious print requests.

VOTES:
   ACCEPT(2) Frech, Hill
   NOOP(1) Northcutt
   REVIEWING(1) Shostack

COMMENTS:
 Shostack> Question: Is this run arbitrary commands as root...?

Page Last Updated or Reviewed: May 22, 2007