[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[VOTES] Vote details for recent clusters with advisories



This LEGACY-RECENT-ADVISORIES meta-cluster includes vote details for
clusters proposed after October 1999.  All of these candidates have
formal advisories associated with them.

UNIX-VEN
LINUX
CERT2
MS

Also, note that in the ALL-NEW meta-cluster containing the RECENT-XX
clusters, I inadvertently included candidates that went to final
decision.  It was bound to happen sometime.  Future meta-clusters will
not include such candidates.

- Steve


--------------------- CLUSTER UNIX-VEN ---------------------

UNIX-VEN (25 candidates)
--------------------
Proposed: 12/13
Scheduled Proposed: 12/13
Scheduled Interim Decision: 12/27
Scheduled Final Decision: 12/31

Various problems acknowledged by Unix vendors


Voters:
  Frech MODIFY(3) REJECT(1) REVIEWING(4)
  Christey NOOP(1) REJECT(1) REVIEWING(1)
  Cole ACCEPT(6) NOOP(2)
  Prosser ACCEPT(5) MODIFY(2) REVIEWING(1)
  Stracener ACCEPT(5) MODIFY(3)
  Blake ACCEPT(8)


<FINAL> --> 17
<INTERIM> --> 1
<PROPOSED> --> 7
MODIFY --> 2
REJECT --> 1
REVIEWING --> 5

=================================
Candidate: CAN-1999-0684
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: HP:HPSBUX9904-097

Denial of service in Sendmail 8.8.6 in HPUX.

INFERRED ACTION: CAN-1999-0684 SMC_REJECT (2 reject, 4 accept, 0 review)

Current Votes:
   ACCEPT(2) Cole, Blake
   MODIFY(2) Stracener, Prosser
   REJECT(2) Frech, Christey

Comments:
 Stracener> Add Ref: CIAC: J-040
 Frech> Without further information and/or references, this issue looks like an
 Frech> ambiguous version of CVE-1999-0478: Denial of service in HP-UX sendmail
 Frech> 8.8.6 related to accepting connections.
 Prosser> Might change description to indicate DoS caused by multiple connections
 Christey> Andre's right.  This is a duplicate of CAN-1999-0684.


=================================
Candidate: CAN-1999-0694
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 19991228-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: CIAC:J-055
Reference: IBM:ERS-SVA-E01-1999:002.1
Reference: XF:aix-ptrace-halt

Denial of service in AIX ptrace system call allows local users to
crash the system.

Modifications:
  ADDREF XF:aix-ptrace-halt
  DELREF BUGTRAQ:19990713

INFERRED ACTION: CAN-1999-0694 ACCEPT (4 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(3) Blake, Stracener, Prosser
   MODIFY(1) Frech
   NOOP(2) Cole, Christey

Comments:
 Frech> XF:aix-ptrace-halt
 Frech> Please add title to the BugTraq reference, since it was not evident to which
 Frech> message you were referring.
 Christey> I couldn't find the Bugtraq reference either, which is
 Christey> especially odd because the IBM advisory says that the
 Christey> problem was discussed in Bugtraq.  Bugtraq reference deleted.


=================================
Candidate: CAN-1999-0767
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: SUN:00189

Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES
environmental variable.

INFERRED ACTION: CAN-1999-0767 SMC_REVIEW (4 accept, 2 review)

Current Votes:
   ACCEPT(2) Cole, Blake
   MODIFY(2) Stracener, Frech
   REVIEWING(2) Prosser, Christey

Comments:
 Stracener> Add Ref: CIAC: J-069
 Frech> XF:sun-libc-lcmessages
 Prosser> BID 268 is an additional reference for this one as it has info on the Sun
 Prosser> vulnerability.  However, BID 268 also includes AIX in this vulnerability and
 Prosser> refs APARS issued to fix a vulnerability in various 'nixs with the Natural
 Prosser> Language Service environmental variables NSLPATH and PATH_LOCALE depending
 Prosser> on the 'nix, ref CERT CA-97.10, CVE-1999-0041.  However, Georgi Guninski
 Prosser> reported a BO in AIX with LC_MESSAGES + mount, also refed in BID 268, so it
 Prosser> is possible the AIX APARs fix an earlier, similar vulnerability to the Sun
 Prosser> BO in LC_MESSAGES.   This should probably be considered under a different
 Prosser> CAN.  Any ideas?
 Christey> Given that the buffer overflows in CVE-1999-0041 are NLSPATH
 Christey> and PATH_LOCALE, I'd say that's good evidence that this is not
 Christey> the same problem.  But a buffer overflow in libc in
 Christey> LC_MESSAGES... We must ask if these are basically the same
 Christey> codebase.


=================================
Candidate: CAN-1999-0783
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: FreeBSD:FreeBSD-SA-98:05
Reference: CIAC:I-057

FreeBSD allows local users to conduct a denial of service by creating
a hard link from a device special file to a file on an NFS file
system.

INFERRED ACTION: CAN-1999-0783 ACCEPT_REV (4 accept, 3 ack, 1 review)

Current Votes:
   ACCEPT(4) Cole, Blake, Stracener, Prosser
   REVIEWING(1) Frech


=================================
Candidate: CAN-1999-0789
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: BUGTRAQ: Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000
Reference: IBM:ERS-SVA-E01-1

Buffer overflow in AIX ftpd in the libc library.

INFERRED ACTION: CAN-1999-0789 ACCEPT_REV (4 accept, 1 ack, 1 review)

Current Votes:
   ACCEPT(2) Cole, Blake
   MODIFY(2) Stracener, Prosser
   REVIEWING(1) Frech

Comments:
 Stracener> Add Ref: CIAC: J-072
 Frech> On BUGTRAQ reference, add 19990927 as date
 Frech> On IBM reference, correctly cite as ERS-SVA-E01-1999:004.1
 Prosser> ref should read ERS-SVA-E01-1999:004.1
 Prosser> add reference  BID 679


=================================
Candidate: CAN-1999-0796
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: FREEBSD:SA-98.03

FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing
attacks.

INFERRED ACTION: CAN-1999-0796 ACCEPT_REV (3 accept, 2 ack, 1 review)

Current Votes:
   ACCEPT(3) Blake, Stracener, Prosser
   NOOP(1) Cole
   REVIEWING(1) Frech


=================================
Candidate: CAN-1999-0911
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991208
Category: SF
Reference: BUGTRAQ:19990827 ProFTPD
Reference: BUGTRAQ:19990907 ProFTP-1.2.0pre4 buffer overflow -- once more
Reference: FREEBSD:FreeBSD-SA-99:03
Reference: BID:612

Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote
attackers to gain root access via a series of MKD and CWD commands
that create nested directories.

CONTENT-DECISIONS: SF-CODEBASE

INFERRED ACTION: CAN-1999-0911 ACCEPT (5 accept, 2 ack, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Cole, Blake, Stracener, Prosser
   MODIFY(1) Frech

Comments:
 Frech> XF:proftpd-long-dir-bo
 Frech> (I already passed this to you during a BACKMAP message.)


=================================
Candidate: CAN-1999-0964
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991208
Category: SF
Reference: FREEBSD:FreeBSD-SA-97:01

Buffer overflow in FreeBSD setlocale in the libc module.

INFERRED ACTION: CAN-1999-0964 ACCEPT_REV (4 accept, 2 ack, 1 review)

Current Votes:
   ACCEPT(4) Cole, Blake, Stracener, Prosser
   REVIEWING(1) Frech




--------------------- CLUSTER LINUX ---------------------

LINUX (30 candidates)
--------------------
Proposed: 12/13
Scheduled Proposed: 12/13
Scheduled Interim Decision: 12/27
Scheduled Final Decision: 12/31

Linux problems acknowledged by Linux vendors


Voters:
  Christey MODIFY(2) NOOP(1) REVIEWING(1)
  Cole ACCEPT(2) MODIFY(3) NOOP(3)
  Stracener ACCEPT(4) MODIFY(3) REJECT(1)
  Blake ACCEPT(5) MODIFY(1) REJECT(2)


<FINAL> --> 22
<INTERIM> --> 5
<PROPOSED> --> 3
ACCEPT --> 1
MODIFY --> 4
REJECT --> 2
REVIEWING --> 1

=================================
Candidate: CAN-1999-0708
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000106-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990921 BP9909-00: cfingerd local buffer overflow
Reference: BID:651

Buffer overflow in cfingerd allows local users to gain root privileges
via a long GECOS field.

Modifications:
  DELREF DEBIAN:19990806
  CHANGEREF BUGTRAQ BUGTRAQ:19990921 BP9909-00: cfingerd local buffer overflow
  DESC Add GECOS qualifier

INFERRED ACTION: CAN-1999-0708 ACCEPT (3 accept, 1 ack, 0 review)

Current Votes:
   ACCEPT(2) Blake, Stracener
   MODIFY(1) Cole
   NOOP(1) Christey

Comments:
 Cole> This is to general.  I would add:  By setting a carefully designed GECOS
 Cole> field it is possible to execute arbitrary code with root (or nobody )
 Cole> privileges
 Christey> There is no associated DEBIAN reference here, as
 Christey> DEBIAN:19990806 refers to an older remote-only buffer overflow
 Christey> in the username, not GECOS.  (BID:512 also discusses that
 Christey> remote problem, though it may not be exploitable).


=================================
Candidate: CAN-1999-0712
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: CALDERA:CSSA-1999:009
Reference: XF:linux-coas

A vulnerability in Caldera Open Administration System (COAS) allows
the /etc/shadow password file to be made world-readable.

INFERRED ACTION: CAN-1999-0712 SMC_REVIEW (3 accept, 1 review)

Current Votes:
   ACCEPT(2) Cole, Stracener
   MODIFY(1) Blake
   REVIEWING(1) Christey

Comments:
 Blake> This obscurely-written advisory seems to state that COAS will make the
 Blake> file world-readable, not that it allows the user to make it so.  I hardly
 Blake> think that allowing the user to turn off security is a vulnerability.
 Christey> It's difficult to write the description based on what's in
 Christey> the advisory.  If COAS inadvertently changes permissions
 Christey> without user confirmation, then it should be ACCEPTed with
 Christey> appropriate modification to the description.


=================================
Candidate: CAN-1999-0742
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: DEBIAN:19990623
Reference: BID:480

The Debian mailman package uses weak authentication, which allows
attackers to gain privileges.

Modifications:
  ADDREF BID:480

INFERRED ACTION: CAN-1999-0742 ACCEPT_ACK (2 accept, 2 ack, 0 review)

Current Votes:
   ACCEPT(2) Blake, Stracener
   NOOP(1) Cole


=================================
Candidate: CAN-1999-0743
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: XF:trn-symlinks
Reference: DEBIAN:19990823c
Reference: SUSE:19990824 Security hole in trn

Trn allows local users to overwrite other users' files via symlinks.

Modifications:
  ADDREF SUSE:19990824 Security hole in trn

INFERRED ACTION: CAN-1999-0743 ACCEPT_ACK (2 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(1) Blake
   MODIFY(1) Stracener
   NOOP(1) Cole

Comments:
 Stracener> Add Ref: SUSE: Security hole in trn 24.08.99


=================================
Candidate: CAN-1999-0748
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: REDHAT:RHSA-1999:017-01

Buffer overflows in Red Hat net-tools package.

INFERRED ACTION: CAN-1999-0748 REJECT (1 reject, 2 accept, 0 review)

Current Votes:
   ACCEPT(2) Cole, Stracener
   REJECT(1) Blake

Comments:
 Blake> RHSA-1999:017-01 describes "potential security problem fixed" in the
 Blake> absence of knowing whether or not the problems actually existed, I don't
 Blake> think we have an entry here.


=================================
Candidate: CAN-1999-0768
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: BID:602
Reference: REDHAT:RHSA-1999:030-02
Reference: SUSE:19990829 Security hole in cron

Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO
environmental variable.

INFERRED ACTION: CAN-1999-0768 ACCEPT (3 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(1) Blake
   MODIFY(3) Cole, Christey, Stracener

Comments:
 Cole> I would be a little clear, By utilizing the MAILTO environment variable, a
 Cole> buffer can be overflown in the cron_popen() function, allowing an attacker
 Cole> to execute arbitrary code.
 Christey> Although the descriptions don't reflect it, CAN-1999-0872 and
 Christey> CAN-1999-0768 are different.  One has to do with a buffer
 Christey> overflow; the other deals with a user supplying their own
 Christey> Sendmail config file.  BID:602 and BID:611 show this.
 Stracener> Add Ref: SUSE: Security hole in cron  29.08.1999:


=================================
Candidate: CAN-1999-0811
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991214
Assigned: 19991125
Category: SF
Reference: BUGTRAQ:19990721 Samba 2.0.5 security fixes
Reference: REDHAT:RHSA-1999:022-02
Reference: CALDERA:CSSA-1999:018.0
Reference: SUSE:19990816 Security hole in Samba
Reference: DEBIAN:19990731 Samba
Reference: XF:samba-message-bo
Reference: BID:536

Buffer overflow in Samba smbd program via a malformed message
command.

Modifications:
  DESC add details
  ADDREF CALDERA:CSSA-1999:018.0
  ADDREF SUSE:19990816 Security hole in Samba
  ADDREF DEBIAN:19990731 Samba
  ADDREF XF:samba-message-bo
  ADDREF BID:536

INFERRED ACTION: CAN-1999-0811 ACCEPT_ACK (2 accept, 5 ack, 0 review)

Current Votes:
   ACCEPT(1) Blake
   MODIFY(1) Stracener
   NOOP(1) Cole

Comments:
 Stracener> Add Ref: CALDERA: CSSA-1999:018.0
 Stracener> Add Ref: DEBIAN: Samba [31-Jul-1999]
 Stracener> Add Ref: SUSE: Security hole in Samba 16.08.1999


=================================
Candidate: CAN-1999-0872
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991214
Assigned: 19991208
Category: SF
Reference: BID:759
Reference: BID:611
Reference: REDHAT:RHSA-1999:030-02

Buffer overflow in Vixie cron allows local users to gain root access
via a long MAILTO environment variable in a crontab file.

INFERRED ACTION: CAN-1999-0872 REJECT (2 reject, 1 accept, 0 review)

Current Votes:
   MODIFY(2) Cole, Christey
   REJECT(2) Blake, Stracener

Comments:
 Cole> 611 is the mail to listed above but 759 is for the mail from and
 Cole> should be listed as a separate vulenrability.
 Blake> This does not appear materially different from CAN-1999-0768
 Christey> Although the descriptions don't reflect it, CAN-1999-0872 and
 Christey> CAN-1999-0768 are different.  One has to do with a buffer
 Christey> overflow; the other deals with a user supplying their own
 Christey> Sendmail config file.  BID:602 and BID:611 show this.
 Stracener> This is a duplicate of candidate CAN-1999-0768.




--------------------- CLUSTER CERT2 ---------------------

CERT2 (26 candidates)
--------------------
Proposed: 12/8
Scheduled Proposed: 12/6
Scheduled Interim Decision: 12/20
Scheduled Final Decision: 12/24

Other CERT advisories not covered in the CERT cluster


Voters:
  Frech MODIFY(3)
  Ozancin ACCEPT(3)
  Cole ACCEPT(3)
  Armstrong ACCEPT(2) NOOP(1)
  Prosser ACCEPT(2) RECAST(1)
  Stracener ACCEPT(2) MODIFY(1)


<FINAL> --> 23
<INTERIM> --> 1
<PROPOSED> --> 2
MODIFY --> 2
RECAST --> 1

=================================
Candidate: CAN-1999-0696
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991125
Category: SF
Reference: CIAC:J-051
Reference: SUN:00188
Reference: CERT:CA-99-08
Reference: HP:00102
Reference: COMPAQ:SSRT0614U_RPC_CMSD

Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd)

INFERRED ACTION: CAN-1999-0696 RECAST (1 recast, 5 accept, 0 review)

Current Votes:
   ACCEPT(3) Cole, Armstrong, Ozancin
   MODIFY(2) Frech, Stracener
   RECAST(1) Prosser

Comments:
 Frech> XF:sun-cmsd-bo
 Prosser> Correct me if I am wrong as I don't have the facilities to test this, but
 Prosser> Sun originally reported this vulnerability in Sun Bulletin 0166, Mar 1998.
 Prosser> The CVE Board accepted it as CVE-1999-0320.  The 00188 Sun Bulletin in July
 Prosser> 1999 is an exact dupe of the 98 bulletin with the exception of some
 Prosser> additional patches for CDE on later versions of SunOS/Solaris. The CERT and
 Prosser> other vendor alerts are additional information on this BO for other vendor's
 Prosser> systems(why it took over a year?), but we already have a CVE number
 Prosser> outstanding for this vulnerability.  Are these seperate vulnerabilities?  Or
 Prosser> the same one just found to affect more than originally thought?  If so,
 Prosser> recommend merging this CAN into the existing CVE, and just adjust the
 Prosser> description in the existing CVE to reflect the additional vulnerable vendor
 Prosser> systems.
 Prosser> Additional reference:  BID 486 and 524
 Stracener> Redundant references to J-051.


=================================
Candidate: CAN-1999-0955
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: CERT:CA-94.08
Reference: CIAC:E-17
Reference: XF:ftp-exec

Race condition in wu-ftpd and BSDI ftpd allows remote attackers gain
root access via the SITE EXEC command.

Modifications:
  ADDREF XF:ftp-exec

INFERRED ACTION: CAN-1999-0955 ACCEPT (6 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(5) Cole, Armstrong, Ozancin, Prosser, Stracener
   MODIFY(1) Frech

Comments:
 Cole> There are actually two vulnerabilities listed in this CERT.  I am assuming
 Cole> that the other one is listed in a different CVE.
 Frech> XF:ftp-exec


=================================
Candidate: CAN-1999-0959
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: AUSCERT:AA-97-05
Reference: SGI:19980301-01-PX

IRIX startmidi and stopmidi programs allow local users to modify
arbitrary files via a symlink attack.

CONTENT-DECISIONS: SF-EXEC, SF-LOC

INFERRED ACTION: CAN-1999-0959 ACCEPT (5 accept, 3 ack, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Cole, Ozancin, Prosser, Stracener
   MODIFY(1) Frech
   NOOP(1) Armstrong

Comments:
 Frech> XF:irix-startmidi-file-creation




--------------------- CLUSTER MS ---------------------

MS (45 candidates)
--------------------
Proposed: 12/8
Scheduled Proposed: 12/6
Scheduled Interim Decision: 12/20
Scheduled Final Decision: 12/24

Some Microsoft Advisories in 1999


Voters:
  Wall ACCEPT(11)
  Frech MODIFY(11)
  Ozancin ACCEPT(9) NOOP(2)
  Christey NOOP(2) REVIEWING(2)
  Cole ACCEPT(4) MODIFY(1) RECAST(1) REJECT(5)
  Prosser ACCEPT(11)
  Stracener ACCEPT(7) MODIFY(4)


<FINAL> --> 34
<INTERIM> --> 4
<PROPOSED> --> 7
MODIFY --> 3
RECAST --> 1
REJECT --> 5
REVIEWING --> 2

=================================
Candidate: CAN-1999-0668
Published:
Final-Decision:
Interim-Decision: 19991229
Modified: 19991227-01
Proposed: 19991208
Assigned: 19991123
Category: SF
Reference: BUGTRAQ:19990821 IE 5.0 allows executing programs
Reference: MS:MS99-032
Reference: CIAC:J-064
Reference: BID:598
Reference: XF:ms-scriptlet-eyedog-unsafe
Reference: MSKB:Q240308

The scriptlet.typelib ActiveX control is marked as "safe for
scripting" for Internet Explorer, which allows a remote attacker to
execute arbitrary commands as demonstrated by Bubbleboy.

Modifications:
  ADDREF XF:ms-scriptlet-eyedog-unsafe
  ADDREF MSKB:Q240308

INFERRED ACTION: CAN-1999-0668 SMC_REVIEW (6 accept, 1 review)

Current Votes:
   ACCEPT(4) Cole, Wall, Prosser, Ozancin
   MODIFY(2) Frech, Stracener
   REVIEWING(1) Christey

Comments:
 Frech> XF:ms-scriptlet-eyedog-unsafe
 Wall> Note:  Was this not CVE 199-0376?
 Stracener> Add Ref: MSKB Q240308
 Christey> Should CAN-1999-0669 and 668 be merged?  If not, then this is
 Christey> a reason for not merging CAN-1999-0988 and CAN-1999-0828.


=================================
Candidate: CAN-1999-0669
Published:
Final-Decision:
Interim-Decision: 19991229
Modified: 19991227-01
Proposed: 19991208
Assigned: 19991123
Category: SF
Reference: MS:MS99-032
Reference: CIAC:J-064
Reference: XF:ms-scriptlet-eyedog-unsafe
Reference: MSKB:Q240308

The Eyedog ActiveX control is marked as "safe for scripting" for
Internet Explorer, which allows a remote attacker to execute arbitrary
commands as demonstrated by Bubbleboy.

Modifications:
  XF:ms-scriptlet-eyedog-unsafe
  MSKB:Q240308

INFERRED ACTION: CAN-1999-0669 SMC_REVIEW (6 accept, 1 review)

Current Votes:
   ACCEPT(4) Cole, Wall, Prosser, Ozancin
   MODIFY(2) Frech, Stracener
   REVIEWING(1) Christey

Comments:
 Frech> XF:ms-scriptlet-eyedog-unsafe
 Stracener> Add Ref: MSKB Q240308
 Christey> Should CAN-1999-0669 and 668 be merged?  If not, then this is
 Christey> a reason for not merging CAN-1999-0988 and CAN-1999-0828.


=================================
Candidate: CAN-1999-0670
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991123
Category: SF
Reference: MS:MS99-032
Reference: CIAC:J-064

Buffer overflow in the Eyedog ActiveX control allows a remote attacker
to execute arbitrary commands.

INFERRED ACTION: CAN-1999-0670 REJECT (1 reject, 5 accept, 0 review)

Current Votes:
   ACCEPT(3) Wall, Prosser, Ozancin
   MODIFY(2) Frech, Stracener
   REJECT(1) Cole

Comments:
 Frech> XF:ie-eyedog-bo
 Cole> Based on the references and information listed this is the same as
 Cole> CAN-1999-0669
 Stracener> Add Ref: MSKB Q240308


=================================
Candidate: CAN-1999-0736
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991125
Category: SF
Reference: L0PHT:May7,1999
Reference: MS:MS99-013
Reference: MSKB:Q232449
Reference: MSKB:Q231368

The showcode.asp sample file in IIS and Site Server allows remote
attackers to read arbitrary files.

CONTENT-DECISIONS: SF-LOC

INFERRED ACTION: CAN-1999-0736 ACCEPT (6 accept, 3 ack, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Wall, Prosser, Ozancin, Stracener
   MODIFY(2) Frech, Cole

Comments:
 Frech> XF:iis-samples-showcode
 Cole> There are several sample files that allow this.  I would quote
 Cole> showcode.asp but make it more generic.
 Prosser> (Modify)
 Prosser> Have a question on this and on the following three candidates as well.  All
 Prosser> of these are part of the file viewers utilities that allow unauthorized
 Prosser> files reading, but MSKB Q231368 also mentioned the diagnostics
 Prosser> program,Winmsdp.exe, as another vulnerable viewer in this same set of
 Prosser> viewers.  If we are going to split out the seperate viewer tools then
 Prosser> shouldn't there should be a seperate CAN for Winmsdp.exe also.


=================================
Candidate: CAN-1999-0737
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991125
Category: SF
Reference: MS:MS99-013
Reference: MSKB:Q231656

The viewcode.asp sample file in IIS and Site Server allows remote
attackers to read arbitrary files.

CONTENT-DECISIONS: SF-LOC

INFERRED ACTION: CAN-1999-0737 REJECT (1 reject, 5 accept, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Wall, Prosser, Ozancin, Stracener
   MODIFY(1) Frech
   REJECT(1) Cole

Comments:
 Frech> XF:iis-samples-viewcode
 Cole> I would combine this with the previous.
 Prosser> (modify)
 Prosser> See comments in 0736 above


=================================
Candidate: CAN-1999-0738
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991125
Category: SF
Reference: MS:MS99-013
Reference: MSKB:Q232449
Reference: MSKB:Q231368

The code.asp sample file in IIS and Site Server allows remote
attackers to read arbitrary files.

CONTENT-DECISIONS: SF-LOC

INFERRED ACTION: CAN-1999-0738 REJECT (1 reject, 5 accept, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Wall, Prosser, Ozancin, Stracener
   MODIFY(1) Frech
   REJECT(1) Cole

Comments:
 Frech> XF:iis-samples-code
 Cole> Same as above
 Prosser> (modify)
 Prosser> See comments in 0736 above


=================================
Candidate: CAN-1999-0739
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991125
Category: SF
Reference: MS:MS99-013
Reference: MSKB:Q232449
Reference: MSKB:Q231368

The codebrws.asp sample file in IIS and Site Server allows remote
attackers to read arbitrary files.

CONTENT-DECISIONS: SF-LOC

INFERRED ACTION: CAN-1999-0739 REJECT (1 reject, 5 accept, 0 review) HAS_CDS

Current Votes:
   ACCEPT(4) Wall, Prosser, Ozancin, Stracener
   MODIFY(1) Frech
   REJECT(1) Cole

Comments:
 Frech> XF:iis-samples-codebrws
 Cole> Same as above.
 Prosser> (modify)
 Prosser> See comments in 0736 above


=================================
Candidate: CAN-1999-0874
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: MS:MS99-019
Reference: MSKB:Q234905
Reference: EEYE:AD06081999
Reference: CERT:CA-99-07
Reference: CIAC:J-048

Buffer overflow in IIS via a malformed request for files with .HTR,
.IDC, or .STM extensions.

INFERRED ACTION: CAN-1999-0874 RECAST (1 recast, 5 accept, 0 review)

Current Votes:
   ACCEPT(4) Wall, Prosser, Ozancin, Stracener
   MODIFY(1) Frech
   RECAST(1) Cole

Comments:
 Frech> XF:iis-htr-overflow
 Cole> This description is very general and covers about 5 different
 Cole> exploits with IIS.
 Cole> The thing to remember is that with Microsoft there are so many
 Cole> vulenrabilities that
 Cole> you must be very specific.  I would add the following:
 Cole> Microsoft has released a patch that eliminates a vulnerability in
 Cole> the Taskpads feature, which is provided as
 Cole> part of the Microsoft® Windows® 98 Resource Kit, Windows 98
 Cole> Resource Kit Sampler, and BackOffice®
 Cole> Resource Kit, second edition. The vulnerability could allow a
 Cole> malicious web site operator to run executables
 Cole> on the computer of a visiting user. Only customers who have
 Cole> installed one of the affected products and who
 Cole> surf the web using the machines on which they are installed are at
 Cole> risk from this vulnerability.


=================================
Candidate: CAN-1999-0898
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: MS:MS99-047
Reference: MSKB:Q243649
Reference: XF:nt-printer-spooler-bo
Reference: BID:768

Buffer overflows in Windows NT 4.0 print spooler allow remote
attackers to gain privileges or cause a denial of service via a
malformed spooler request.

Modifications:
  ADDREF XF:nt-printer-spooler-bo
  ADDREF BID:768

INFERRED ACTION: CAN-1999-0898 ACCEPT (5 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(4) Cole, Wall, Prosser, Stracener
   MODIFY(1) Frech
   NOOP(2) Ozancin, Christey

Comments:
 Frech> XF:nt-printer-spooler-bo
 Prosser> (Modify)
 Prosser> This maybe should be seperated into two entries.  One for the DoS which is
 Prosser> just done with random data and one for the more experienced attack of
 Prosser> gaining privileges on the host.
 Christey> While the advisory is not entirely explicit, the difference
 Christey> between the DoS and the command execution is only in effect,
 Christey> and appears to be in the same line of code, so the SF-LOC
 Christey> content decision applies here.


=================================
Candidate: CAN-1999-0899
Published:
Final-Decision:
Interim-Decision: 20000111
Modified: 20000111-01
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: MS:MS99-047
Reference: MSKB:Q243649
Reference: BID:769
Reference: XF:nt-printer-spooler-bo

The Windows NT 4.0 print spooler allows a local user to execute
arbitrary commands due to inappropriate permissions that allow the
user to specify an alternate print provider.

Modifications:
  ADDREF XF:nt-printer-spooler-bo
  ADDREF BID:769

INFERRED ACTION: CAN-1999-0899 ACCEPT (5 accept, 3 ack, 0 review)

Current Votes:
   ACCEPT(4) Cole, Wall, Prosser, Stracener
   MODIFY(1) Frech
   NOOP(2) Ozancin, Christey

Comments:
 Frech> XF:nt-printer-spooler-bo
 Cole>
 Cole> [Originally rejected; vote changed to ACCEPT based on feedback]
 Cole> This should be combined with the previous one to state it can cause
 Cole> a denial of service
 Cole> or allow commands to ve executed.  Just because a vulnerability can
 Cole> be exploited in different ways
 Cole> does not mean there should be separate entries since the underlying
 Cole> exploit is the same.
 Christey> This is different than CAN-1999-0898 because 898 is a buffer
 Christey> overflow, while this one is incorrect permissions.  They
 Christey> are different bugs, so should have separate entries.  Note
 Christey> that MS99-047 also discriminates between these two candidates,
 Christey> i.e. it contains the phrase "A second vulnerability exists..."
 Christey> and goes on to describe CAN-1999-0899.


=================================
Candidate: CAN-1999-0910
Published:
Final-Decision:
Interim-Decision:
Modified:
Proposed: 19991208
Assigned: 19991208
Category: SF
Reference: MS:MS99-035
Reference: BID:625

Microsoft Site Server and Commercial Internet System (MCIS) do not set
an expiration for a cookie, which could then be cached by a proxy and
inadvertently used by a different user.

INFERRED ACTION: CAN-1999-0910 REJECT (1 reject, 5 accept, 0 review)

Current Votes:
   ACCEPT(3) Wall, Prosser, Ozancin
   MODIFY(2) Frech, Stracener
   REJECT(1) Cole

Comments:
 Frech> XF:siteserver-cis-cookie-cache
 Cole> Whether cookies are a vulnerbality is a debate for another time, the
 Cole> question here is whether the
 Cole> expiration feature is a vulnerability and I do not think it is
 Cole> because the underlying concerns for this
 Cole> are present even without this feature.  The expiration feature does
 Cole> not add any new vulenrabilities
 Cole> that are not already present with cookies.
 Stracener> Add Ref: MSKB Q238647

Page Last Updated or Reviewed: May 22, 2007