home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chaos Computer Club 1997 February
/
cccd_beta_feb_97.iso
/
contrib
/
cert
/
readme
< prev
next >
Wrap
PGP Signed Message
|
1997-02-28
|
42KB
|
856 lines
-----BEGIN PGP SIGNED MESSAGE-----
This file: info.cert.org:/pub/cert_advisories/01-README
*******************************************************************
* *
* This file contains a list of the CERT(sm) advisories. *
* Advisories are updated as new information is received. *
* See the revision history at the end of each file. *
* *
* See also ftp://info.cert.org/pub/latest_sw_versions/ to keep *
* informed about new releases of software that contain fixes *
* for security problems. *
* *
* Note: We do not attempt to keep all URLs and MD5 checksums up *
* to date. If you cannot reach a URL, please notify the *
* administrator of the site. For checksums, you should *
* check with your vendor for current values. *
* *
* CERT(sm) advisories may be reproduced and distributed without *
* permission provided it is for noncommercial purposes and the *
* statement "Copyright Carnegie Mellon University" is included. *
* *
*******************************************************************
CA-88:01.ftpd.hole 12/88
Warning about BSD sendmail 5.59 debug command; general warning
about getting latest version of ftpd; other general warnings.
** The sendmail portion of this advisory is superseded by CA-96.20,
CA-96.24, and CA-96.25. **
CA-89:01.passwd.hole 01/89
Report from Keith Bostic of BSD patch for passwd(1) program.
CA-89:02.sun.restore.hole 07/26/89
Vulnerability in SunOS 4.0.* restore(8) command.
CA-89:03.telnet.breakin.warning 08/16/89
Warning about a series of break-ins in which an intruder replaced
the telnet(1) program with a Trojan horse that captured
passwords. Contains some general hints about securing systems.
CA-89:04.decnet.wank.worm 10/17/89
Warning about the "WANK" worm which attacked DECnet hosts.
CA-89:05.ultrix3.0.hole 10/17/89
Warning about attacks on DEC/Ultrix 3.0 machines. Advises users
to check for Trojan horses, insecure tftp, simple passwords.
CA-89:06.ultrix3.0.update 10/18/89
A repost of the 10/17 Ultrix advisory with checksums for several
Ultrix system programs.
CA-89:07.sun.rcp.vulnerability 10/26/89
Vulnerability in SunOS 4.0.x rcp command.
CA-90:01.sun.sendmail.vulnerability 01/29/90
Vulnerability in SunOS 3.* and 4.0.* sendmail.
**Superseded by CA-96.20, CA-96.24, and CA-96.25.
CA-90:02.intruder.warning 03/19/90
Warning about a series of attacks on Internet systems. Includes
a list of 14 points to check on Unix and VMS systems. The points
cover possible signs of a break-in as well as possible system
configuration vulnerabilities.
CA-90:03.unisys.warning 05/07/90
Warning about Unisys U5000 systems. Some of the logins supplied
when the system was shipped did not have passwords, and intruders
were taking advantage of this vulnerability.
CA-90:04.apollosuid.vulnerability 07/27/90
Vulnerability in Hewlett Packard/Apollo Domain/OS version sr10.2
and some beta versions of sr10.3. File /etc/suid_exec contained
a security flaw.
CA-90:05.sunselection.vulnerability 08/14/90
Vulnerability in SunOS 3.*, 4.0.3, and 4.1 SunView selection_svc
facility.
CA-90:06a.NeXT.vulnerability 10/03/90
Describes several vulnerabilities in NeXT system software. The
advisory was originally issued as 90:06; 90:06a includes several
corrections.
CA-90:07.VMS.ANALYZE.vulnerability 10/25/90
Vulnerability in DEC VMS versions 4.0 through 5.4. Problem with
ANALYZE/PROCESS_DUMP routine.
CA-90:08.irix.mail 10/31/90
Vulnerability in Silicon Graphics IRIX 3.3 and 3.3.1 systems.
/usr/sbin/Mail has a security flaw.
CA-90:09.vms.breakins.warning 11/09/90
Warning about techniques intruders were using to get access to
VMS systems. No new vulnerabilities described; intruders were
using weak password attacks.
CA-90:10.attack.rumour.warning 11/16/90
Message about alleged attacks on telephone systems. No evidence
that rumors were substantiated.
CA-90:11.Security.Probes 12/10/90
Many sites on the Internet received messages on Sunday, December 9. The
messages stated that a group of researchers and students were testing
for a "common bug" in network hosts.
CA-90:12.SunOS.TIOCCONS.vulnerability 12/21/90
This Advisory was a rebroadcast of a Sun Microsystems, Inc. Security
Bulletin announcing the availability of a patch that corrects a problem
with TIOCCONS. Problem Description: TIOCCONS can be used to re-direct
console output/input away from "console"
CA-91:01a.SunOS.mail.vulnerability 02/22/91
** Superseded by CA-95:02. **
CA-91:02a.SunOS.telnetd.vulnerability 03/26/91
This advisory announces a security problem with the in.telnetd program
in releases of SunOS 4.1 and 4.1.1.
CA-91:03.unauthorized.password.change.request 04/04/91
This advisory addresses recent bogus email messages which have been
distributed on the Internet. The messages request that the user
change his/her password, and appear to come from the system admin.
CA-91:04.social.engineering 04/18/91
This advisory is an addition to CA-91:03. It addresses more bogus
Internet email scams and urges system administrators to warn their
users.
CA-91:05.Ultrix.chroot.vulnerability 05/01/91
Corrects improper installation of /usr/bin/chroot for Ultrix
versions 4.0 and 4.1.
CA-91:06.NeXTstep.vulnerability 05/14/91
Addresses three vulnerabilities in NeXT systems running various
versions of NeXTstep. Affected are: rexd(8C), /private/etc,
username "me".
CA-91:07.SunOS.source.tape.vulnerability 05/20/91
Fixes a security vulnerability on SunOS (4.0.3, 4.1, and 4.1.1)
systems which have installed the Sun Source tapes.
CA-91:08.systemV.login.vulnerability 05/23/91
Addresses a vulnerability in all System V Release 4 versions of
/bin/login. Patch provided by AT&T.
CA-91:09.SunOS.rpc.mountd.vulnerability 07/15/91
** Superseded by CA-94:02. **
CA-91:10a.SunOS.lpd.vulnerability 09/12/91
Vulnerability in SunOS 4.0.3, 4.1, and 4.1.1 /usr/lib/lpd.
Patched versions are available. Version 10a of this advisory
supersedes all prior versions.
CA-91:11.Ultrix.LAT-Telnet.gateway.vulnerability 08/14/91
Vulnerability in Ultrix LAT/Telnet gateway software on
all Ultrix 4.1 and 4.2 systems. Patch available directly from
DEC.
CA-91:12.Trusted.Hosts.Configuration.vulnerability 08/22/91
Vulnerability in MANY Unix systems regarding the use of
a minus sign ("-") as the first character in any hosts.equiv
hosts.lpd, and/or .rhosts files. Workaround is to re-arrange
the lines in these files such that the "-" is not the
first character in the file.
CA-91:13.Ultrix.mail.vulnerability 08/23/91
** Superseded by CA-95:02. **
CA-91:14.IRIX.mail.vulnerability 08/26/91
Vulnerability regarding the handling of mail messages on
all Silicon Graphics IRIX Systems prior to version 4.0.
The problem is fixed in version 4.0. Solution involves
changing permissions and ownership of a system command.
CA-91:15.NCSA.Telnet.vulnerability 09/10/91
Vulnerability in PC and Mac telnet program by NCSA. This
advisory details a workaround.
CA-91:16.SunOS.SPARC.Integer_Division.vulnerability 09/18/91
** The patch cited in this advisory has been obsoleted by
patches described in CA-92:15. **
CA-91:17.DECnet-Internet.Gateway.vulnerability 09/26/91
Vulnerability in Ultrix DECnet to Internet gateway software.
This advisory details a workaround. The vulnerability affects
Ultrix versions 4.0, 4.1, and 4.2.
CA-91:18.Active.Internet.tftp.Attacks 09/27/91
Warning about automated tftp probes for /etc/passwd to Internet
sites throughout the world. Urges all sites to carefully check
their system configurations concerning tftp usage. Indicates
how sites can secure their tftp configurations.
CA-91:19.AIX.TFTP.Daemon.vulnerability 10/17/91
Vulnerability in the TFTP daemon in all versions of AIX for
IBM RS/6000 machines. Patch available from IBM for all AIX
releases from "GOLD" to the current release.
CA-91:20.rdist.vulnerability 10/22/91
** Superseded by CA-96.14. **
CA-91:21.SunOS.NFS.Jumbo.and.fsirand 12/06/91
Vulnerabilities concerning Sun Microsystems, Inc. (Sun) Network
File System (NFS) and the fsirand program. These vulnerabilities
affect SunOS versions 4.1.1, 4.1, and 4.0.3 on all architectures.
Patches are available for SunOS 4.1.1. An initial patch for SunOS
4.1 NFS is also available. Sun will be providing complete patches
for SunOS 4.1 and SunOS 4.0.3 at a later date.
CA-91:22.SunOS.OpenWindows.vulnerability 12/16/91
** Superseded by CA-93:18. **
CA-91:23.Apollo.crp.vulnerability 12/18/91
A vulnerability is present in the crp system in Hewlett Packard/Apollo
Domain/OS in all SR10 versions. A workaround is available and
patches for SR10.3 and SR10.4 will be available from Apollo
at a future date.
CA-92:01.NeXTstep.configuration.vulnerability 01/20/92
A vulnerability is present in the default configuration in
release 2 of NeXTstep's NetInfo. The advisory indicates where
a description of how to configure NetInfo correctly can be obtained.
CA-92:02.Michelangelo.PC.virus.warning 02/06/92
This advisory warns users of a PC virus called Michelangelo.
The virus affects IBM PCs and compatibles, and has a trigger
date of March 6 (any year).
CA-92:03.Internet.Intruder.Activity 02/17/92
Warning about a significant intrusion incident on the Internet.
Urges all system administrators to check their systems for the
signs of intrusion detailed in the advisory.
CA-92:04.ATT.rexecd.vulnerability 02/25/92
A vulnerability is present in AT&T TCP/IP Release 4.0 running
on SVR4 systems for both the 386/486 and 3B2 RISC platforms.
The problem is in the remote execution server /usr/etc/rexecd
and a new version of rexecd is available from AT&T.
CA-92:05.AIX.REXD.Daemon.vulnerability 03/05/92
The rexd daemon may be enabled by default in versions 3.1 and 3.2
of AIX for IBM RS/6000 machines. The advisory describes a fix for
the problem and details how to obtain a patch for the problem from
IBM.
CA-92:06.AIX.uucp.vulnerability 03/19/92
A vulnerability is present in the UUCP software in versions of
AIX up to 2007. The advisory describes how to disable UUCP and
details how to obtain a patch for the problem from IBM.
CA-92:07.AIX.passwd.vulnerability 03/31/92
A vulnerability is present in the passwd command in AIX 3.2 and
the 2007 update of AIX 3.1. The advisory describes how to disable
the /bin/passwd until you obtain and install the patch for the
problem from IBM.
CA-92:08.SGI.lp.vulnerability 04/10/92
A vulnerability is present in the default configuration of the lp
software in Silicon Graphics Computer Systems (SGI) IRIX operating
systems. This vulnerability is present in all versions of IRIX,
prior to IRIX 4.0.5. The advisory describes how to reconfigure the
lp software in order to eliminate this vulnerability.
CA-92:09.AIX.anonymous.ftp.vulnerability 04/27/92
A vulnerability is present in the anonymous FTP configuration in all
versions of AIX. The advisory describes how to obtain a patch for
the problem from IBM.
CA-92:10:AIX.crontab.vulnerability 05/26/92
A vulnerability is present in crontab(1) in version 3.2 of AIX.
This advisory describes how to implement a workaround for the
problem until you obtain the patch for the problem from IBM.
CA-92:11:SunOS.Environment.vulnerability 05/27/92
A vulnerability involving environment variables and setuid/setgid
programs exists on all Sun architectures running SunOS 4.0 and
higher. The advisory details how to obtain patches for SunOS
programs which are known to be impacted by the vulnerability.
The advisory contains a workaround to protect vulnerable binaries
for which patches are unavailable for your SunOS version, or for
local or third party software which may be vulnerable.
CA-92:12.REVISED.SunOS.rpc.mountd.vulnerability 05/28/92
** Superseded by CA-94:02. **
CA-92:13.SunOS.NIS.vulnerability 06/04/92
Vulnerabilities are present in NIS under SunOS 4.1, 4.1.1, and
4.1.2, and may or may not exist in earlier versions of NIS. The
advisory describes how to obtain a patch for SunOS 4.1, 4.1.1, and
4.1.2 for the problem from Sun.
CA-92:14.Altered.System.Binaries.Incident 06/22/92
Warning about a significant intrusion incident on the Internet.
Urges all system administrators to check their systems for the
signs of intrusion detailed in the advisory.
CA-92:15.Multiple.SunOS.vulnerabilities.patched 07/21/92
** This advisory supersedes CA-91:16. **
The advisory describes how to obtain various patches for SunOS 4.1,
4.1.1, and 4.1.2 for all Sun architectures. As the application of
these patches involves rebuilding your system kernel, it is
recommended that you apply all patches simultaneously.
CA-92:16.VMS.Monitor.vulnerability 09/22/92
** Superseded by CA-92:18. **
CA-92:17.HP.NIS.ypbind.vulnerability 10/05/92
** Superseded by CA-93:01. **
CA-92:18.VMS.Monitor.vulnerability.update 11/17/92
** This advisory supersedes CA-92:16. **
It provides additional information concerning availability of remedial
image kits to correct a vulnerability present in the Monitor utility in
VMS V5.0 through V5.4-2. The vulnerability has been corrected in V5.4-3
through V5.5-1.
CA-92:19.Keystroke.Logging.Banner.Notice 12/07/92
This advisory provides information from the United States Department of
Justice, General Litigation and Legal Advice Section, Criminal Division,
regarding keystroke monitoring by computer systems administrators, as a
method of protecting computer systems from unauthorized access. The CERT
staff strongly suggests adding a notice banner such as the one included
in the advisory to all systems. Sites not covered by U.S. law should
consult their legal counsel.
CA-92:20.Cisco.Access.List.vulnerability 12/10/92
This advisory provides information concerning a vulnerability in Cisco
router access lists when the "established" keyword is used.
This vulnerability is present in Cisco software releases 8.2, 8.3, 9.0
and 9.1. The advisory describes workarounds and provides information on
how to obtain a patch for the problem from Cisco.
CA-92:21.ConvexOS.vulnerabilities 12/16/92
This advisory provides information concerning several vulnerabilities in
ConvexOS/Secure, CONVEX CXbatch, CONVEX Storage Manager (CSM), and
ConvexOS EMACS. These vulnerabilities can affect ConvexOS versions
V6.2 - V10.2 and ConvexOS/Secure versions V9.5 and V10.0 on all supported
architectures. The advisory describes a workaround for one of the
vulnerabilities and provides information on how to obtain a patches for
the other problems from CONVEX Computer Corporation.
CA-93:01.REVISED.HP.NIS.ypbind.vulnerability 01/13/93
** This advisory supersedes CA-92:17. **
A vulnerability is present in Hewlett-Packard's HP/UX Operating
System for series 300, 700, and 800 computers, which allows
remote NIS servers unauthorized access to local NIS hosts.
Patches from HP are available for all of the HP/UX level 8 releases
(8.0, 8.02, 8.06, and 8.07). The problem is fixed in HP/UX 9.0.
CA-93:02a.NeXT.NetInfo._writers.vulnerabilities 01/21/93
This advisory provides information concerning vulnerabilities in the
distributed printing facility ("_writers" properties) of NeXT
computers running all releases of NeXTSTEP software through NeXTSTEP
Release 3.0. The advisory details the availability of a patch for the
problems and provides suggested workarounds.
CA-93:03.SunOS.Permissions.vulnerability 02/03/93
This advisory describes a patch that is available to correct
the ownerships and permissions for a number of system files in
SunOS 4.1, 4.1.1, 4.1.2, and 4.1.3. These have been fixed in
SunOS 5.0. CERT staff has seen an increasing number of attackers
exploit these problems on systems and we encourage sites to
consider installing this patch.
CA-93:04a.Amiga.finger.vulnerability 02/18/93
A vulnerability is present in the "finger" program of Commodore
Business Machine's Amiga UNIX product and affects Commodore
Amiga UNIX versions 1.1, 2.03, 2.1, 2.1p1, 2.1p2, and 2.1p2a.
This advisory details the availability of a patch for the problem
and provides a suggested workaround.
CA-93:05.OpenVMS.AXP.vulnerability 02/24/93
A vulnerability is present with Digital Equipment Corporation's
OpenVMS and OpenVMS AXP. This vulnerability is present in OpenVMS
V5.0 through V5.5-2 and OpenVMS AXP V1.0 but has been corrected
in OpenVMS V6.0 and OpenVMS AXP V1.5. This advisory provides
details from Digital on the severity of the vulnerability and
patch availability for the problem.
CA-93:06.wuarchive.ftpd.vulnerability 04/09/93
A vulnerability is present in versions of wuarchive ftpd available
before April 8, 1993. This vulnerability is present in wuarchive ftpd
versions which were available from wuarchive.wustl.edu and many other
anonymous FTP sites. This advisory provides details on the severity
of the vulnerability and (1) the availability of a new version of
wuarchive ftpd and (2) availability of a patch for the problem.
CA-93:07.Cisco.Router.Packet.Handling.Vulnerability 04/22/93
A vulnerability exists in Cisco routers such that a router which
is configured to suppress source routed packets with the following
command: "no ip source-route" may allow traffic which should be
suppressed. This vulnerability applies to all models of Cisco routers,
and occurs with the following releases of software: 8.2, 8.3, 9.0,
9.1, and 9.17. This advisory details information about releases
available to correct this problem.
CA-93:08.SCO.passwd.Vulnerability 05/24/93
A vulnerability exists in several releases of SCO's Operating Systems.
This vulnerability has the potential to deny legitimate users the
ability to log onto the system. This advisory details information
about releases available to correct this problem.
CA-93:09.SunOS.expreserve.vulnerability 06/11/9
** Superseded by CA-96.19. **
CA-93:09a.SunOS.expreserve.vulnerability 07/01/93
** Superseded by CA-96.19. **
CA-93:10.anonymous.FTP.activity 07/14/93
This advisory provides an updated version of the anonymous FTP
configuration guidelines that is available from the CERT
Coordination Center.
CA-93:11.UMN.UNIX.gopher.vulnerability 08/09/93
Vulnerabilities exist in versions of the UMN UNIX gopher and gopher+
server and client available before August 6, 1993. These vulnerabilities
are present in UMN UNIX gopher and gopher+ versions which were available
from boombox.micro.umn.edu and many other anonymous FTP sites. This
advisory provides details on the severity of the vulnerabilities and
the availability of new versions of UMN UNIX gopher and gopher+.
CA-93:12.Novell.LOGIN.EXE.vulnerability 09/16/93
A vulnerability exists in Novell's NetWare 4.x login program (LOGIN.EXE).
This advisory provides details on the availability of a security-enhance
version of the Novell Netware 4.x login program.
CA-93:13.SCO.Home.Directory.Vulnerability 09/17/93
A vulnerability relating to the "dos" and "asg" accounts exists in
numerous SCO Operating Systems releases. This advisory provides
instructions for repairing the vulnerability.
CA-93:14.Internet.Security.Scanner 09/30/93
This advisory alerts Internet sites to a new software tool that
is widely available. The advisory describes vulnerabilities
probed by the Internet Security Scanner (ISS) software.
CA-93:15.SunOS.and.Solaris.vulnerabilities 10/21/93
This advisory describes several vulnerabilities in Sun operating
systems: /usr/lib/sendmail (SunOS 4.1.x, Solaris 2.x), /bin/tar
(Solaris 2.x), and dev/audio (SunOS 4.1.x, Solaris 2.x). The
advisory includes patch and workaround information for these
problems.
* The sendmail portion of this advisory is superseded by CA-96.20,
CA-96.24, and CA-96.25. *
CA-93:16.sendmail.vulnerability 11/04/93
** Superseded by CA-96.20, CA-96.24, and CA-96.25. **
CA-93:16a.sendmail.vulnerability.supplement 01/07/94
** Superseded by CA-96.20, CA-96.24, and CA-96.25. **
CA-93:17.xterm.logging.vulnerability 11/11/93
This advisory addresses a vulnerability in the logging function of
many versions of xterm. It provides information about several
solutions.
CA-93:18.SunOS.Solbourne.loadmodule.modload.vulnerability 12/15/93
** This advisory supersedes CA-91:22. **
The advisory addresses a vulnerability in /usr/etc/modload
and $OPENWINHOME/bin/loadmodule in in Sun Microsystems, Inc.
SunOS 4.1.1, 4.1.2, 4.1.3, and 4.1.3c and OpenWindows 3.0
on all sun4 and Solbourne Computer, Inc. architectures.
CA-93:19.Solaris.Startup.vulnerability 12/16/93
Information about a vulnerability in the system startup
scripts on Solaris 2.x and Solaris x86 systems.
CA-94:01.ongoing.network.monitoring.attacks 02/03/94
This advisory describes ongoing network monitoring attacks. All
systems that offer remote access through rlogin, telnet, and ftp
are at risk. The advisory includes a description of the activity and
suggested approaches for addressing the problem.
CA-94:02.Revised.Patch.for.SunOS.mountd.vulnerability 02/14/94
** This advisory supersedes CA-91:09 and CA-92:12.**
A vulnerability is present in SunOS 4.1, 4.1.1, 4.1.2, and 4.1.3
/usr/etc/rpc.mountd. Unauthorized remote hosts will be able to mount
the file system. The advisory describes how to obtain a patch for
the problem from Sun.
CA-94:03.AIX.performance.tools 02/24/94
Vulnerabilities are present in the bosext1.extcmds.obj
performance tools in AIX 3.2.5 and in those AIX 3.2.4 systems
with Program Temporary Fixes (PTFs) U420020 or U422510 installed.
These problems do not exist in earlier versions of AIX.
CA-94:04.SunOS.rdist.vulnerability 03/17/94
** Superseded by CA-96.14. **
CA-94:05.MD5.checksums 03/18/94
This advisory gives the MD5 checksums for a number of SunOS
files, along with a tool for checking them.
CA-94:06.utmp.vulnerability 03/21/94
This advisory addresses a vulnerability with /etc/utmp ins
SunOS 4.1.X and Solaris 1.1.1 operating systems. Solbourne
Computer, Inc. and other Sparc products using SunOS 4.1.X or
Solaris 1.1.1 are also affected. Solaris 2.x is not affected
by this problem.
CA-94:07.wuarchive.ftpd.trojan.horse 04/06/94
Warning about intruder-modified source for wuarchive ftpd,
which introduced a Trojan horse in versions 2.2, 2.1f, and
possibly earlier versions. Recommended solution is to
upgrade to version 2.3.
CA-94:08.ftpd.vulnerabilities 04/14/94
This advisory addresses two vulnerabilities with some releases of
fptd and announces new versions and patches to correct these
problems. ftpd versions affected are wuarchive ftpd 2.0-2.3,
DECWRL ftpd versions prior to 5.93, and BSDI ftpd version 1.1
prior to patch level 5. The vulnerabilities addressed are the
SITE EXEC and race condition vulnerabilities.
CA-94:09.bin.login.vulnerability 05/23/94
This advisory addresses a vulnerability in /bin/login of all
IBM AIX 3 systems, and Linux systems. A workaround and patch
information are included in this advisory.
CA-94:10.IBM.AIX.bsh.vulnerability 06/3/94
This advisory addresses a vulnerability in the batch queue (bsh)
of IBM AIX systems running versions prior to and including AIX
3.2. CERT staff recommends a workaround to disable the bsh feature.
IBM provides a patch for systems requiring this functionality.
CA-94:11.majordomo.vulnerabilities 06/9/94
This advisory addresses two vulnerabilities in Majordomo
versions prior to 1.92. CERT staff recommends installing version
1.92, but provides workarounds if this is not possible.
CA-94:12.sendmail.vulnerabilities 07/14/94
** Superseded by CA-96.20, CA-96.24, and CA-96.25. **
CA-94:13.SGI.IRIX.Help.Vulnerability 08/11/94
This advisory addresses a vulnerability in the Silicon Graphics, Inc.
IRIX 5.x Help system. SGI recommends installing the patch, but has
provided a workaround to disable the Help system if this is not
possible.
CA-94:14.trojan.horse.in.IRC.client.for.UNIX 10/19/94
This advisory discusses a Trojan horse that was found in version 2.2.9
or ircII, the source code for the Internet Relay Chat (IRC) client for
UNIX systems. For reasons described in the advisory, the CERT staff
urges everyone to install ircII version 2.6.
CA-94:15.NFS.Vulnerabilities 12/19/94
This advisory describes security measures to guard against several
vulnerabilities in the Network File System (NFS). The advisory was
prompted by an increase in root compromises by intruders using tools
to exploit the vulnerabilities.
CA-95:01.IP.spoofing.attacks.and.hijacked.terminal.connections 1/23/95
The IP spoofing portion of this advisory has been
superseded by CA-96.21. The description of the intruder
activity of hijacking terminals is still current.
CA-95:02.binmail.vulnerabilities 1/26/95
** This advisory supersedes CA-91:01a and CA-91:13. **
It addresses vulnerabilities in some versions of /bin/mail
based on BSD 4.3 UNIX. It includes a list of vendor patches
and source code for mail.local.c, an alternative to /bin/mail.
CA-95:03.telnet.encryption.vulnerability 2/16/95
** Superseded by CA-95:03a. **
CA-95:03a.telnet.encryption.vulnerability 3/3/95
** This advisory supersedes CA-95:03. **
Description and patch information for a security problem in the
Berkeley Telnet clients that support encryption and Kerberos V4
authentication. It provides additional information.
CA-95:04.NCSA.http.daemon.for.unix.vulnerability 2/17/95
This advisory provides a patch for a vulnerability in the NCSA
HTTP daemon version 1.3 for UNIX.
CA-95:05.sendmail.vulnerabilities 2/22/95
** Superseded by CA-96.20, CA-96.24, and CA-96.25. **
CA-95:06.satan 4/3/95
An overview of the Security Administrator Tool for Analyzing Networks
(SATAN) based on the CERT staff's review of beta version 0.51.
Includes list of vulnerabilities probed and advice on securing
systems.
CA-95:07.vulnerability.in.satan. 4/10/95
** Superseded by CA-95:07a. **
CA-95:07a.REVISED.satan.vul 4/21/95
** This advisory replaces CA-95:07.**
It is a revision that provides new information the problem described
in CA-95:07, and includes precautions to take when running SATAN.
A tutorial by the SATAN authors, "SATAN Password Disclosure" is
appended to the advisory.
CA-95:08.sendmail.v.5.vulnerability 8/17/95
This advisory describes a vulnerability in sendmail v.5, which is
still in use and which includes IDA sendmail. Many vendors have
previously fixed the problem, others recently developed patches.
CA-95:09.Solaris.ps.vul 8/29/95
This advisory describes a vulnerability in Solaris that can be
exploited if the permissions on the /tmp and /var/tmp directories
are set incorrectly.
CA-95:10.ghostscript 8/31/95
This advisory describes a vulnerability involving the -dSAFER option
in ghostscript versions 2.6 through 3.22 beta. The advisory includes
instructions for fixing the problem and pointers to version 3.33 of
ghostscript.
CA-95:11.sun.sendmail-oR.vul 9/19/95
** Superseded by CA-96.20, CA-96.24, and CA-96.25. **
CA-95:12.sun.loadmodule.vul 10/18/95
The advisory describes a problem with the loadmodule(8) program
in Sun OS 4.1.X and provides patch information.
CA-95:13.syslog.vul 10/19/95
This advisory describes a general problem with syslog, lists
vendor information about patches, and provides a workaround
for solving the syslog problem in sendmail in particular.
CA-95:14.Telnetd_Environment_Vulnerability 11/1/95
This advisory describes a vulnerability with some telnet daemons and
includes patch information from vendors, along with a workaround.
CA-95:15.SGI.lp.vul 11/8/95
This advisory points out accounts that are distributed without
passwords and urges SGI customers to create passwords for those
accounts.
CA-95:16.wu-ftpd.vul 11/30/95
This advisory describes a vulnerability in the wu-fptd SITE EXEC
command and provides solutions for both Linux users and others.
CA-95:17.rpc.ypupdated.vul 12/12/95
This advisory describes a vulnerability in the rpc.ypupdated program,
for which an exploitation program has been posted to several
newsgroups. The advisory includes vendor information and a
workaround.
CA-95:18.widespread.attacks 12/18/95
This advisory warns readers of attacks on hundreds of Internet
sites in which intruders exploit known vulnerabilities, all of
which have been addressed in previous CERT advisories. These
advisories are listed.
CA-96.01.UDP_service_denial 02/08/96
This advisory describes UDP port denial-of-service attacks,
for which an exploitation script has been publicly posted. The
advisory includes a workaround.
CA-96.02.bind 02/15/96
This advisory provides information about version 4.9.3 of BIND
and the vulnerabilities it addresses. The advisory appendix
contains information from vendors.
CA-96.03.kerberos_4_key_server 02/21/96
This advisory describes a problem with the Kerberos 4 key server,
points to patches, and provides vendor information.
CA-96.04.corrupt_info_from_servers 02/22/96
This advisory describes a vulnerability in network servers that
can lead to corrupt information. The advisory includes information
on subroutines for validating host names and IP addresses, patches
for sendmail, and the status of vendor activity relating to the
problem.
CA-96.05.java_applet_security_mgr 03/05/96
This advisory describes a vulnerability in the Netscape Navigator 2.0
Java implementation and in Release 1.0 of the Java Developer's Kit
from Sun Microsystems, Inc. Workarounds and pointers to a patch are
included.
CA-96.06.cgi_example_code 03/20/96
This advisory describes a problem with example CGI code, as found in
the NCSA 1.5a-export and APACHE 1.0.3 httpd, and possibly previous
distributions of both servers. Workarounds are provided.
CA-96.07.java_bytecode_verifier 03/29/96
This advisory describes a vulnerability in the Java bytecode verifier
portion of Sun Microsystems' Java Development Kit (JDK) 1.0 and
1.0.1. Workarounds are provided for this product and Netscape
Navigator 2.0 and 2.01, which have the JDK built in.
CA-96.08.pcnfsd 04/18/96
This advisory describes a vulnerability in the pcnfsd program (also
known as rpc.pcnfsd). A patch is included.
CA-96.09.rpc.statd 04/24/96
This advisory describes a vulnerability in the rpc.statd (or statd)
program that allows authorized users to remove or create any file
that a root user can. Vendor information is included.
CA-96.10.nis+_configuration 05/28/96
This advisory was originally released as AUSCERT advisory CA-96.02a.
It describes a vulnerability and workarounds for versions of NIS+ in
which the access rights on the NIS+ passwd table are left in an
unsecure state.
CA-96.11.interpreters_in_cgi_bin_dir 05/29/96
This advisory warns users not to put interpreters in a Web server's
CGI bin directory and to evaluate all programs in that directory.
CA-96.12.suidperl_vul 06/26/96
This advisory describes a vulnerability in systems that contain
the suidperl program and that support saved set-user-ID and
saved set-group-ID. Patch information is included.
CA-96.13.dip_vul 07/09/96
This advisory describes a vulnerability in the dip program, which is
shipped with most Linux systems. Other UNIX systems may also use it.
Pointers to dip 3.3.7o are included.
CA-96.14.rdist_vul 07/24/96
** This advisory supersedes CA-91:20 and CA-94:04. **
It describes a vulnerability in the lookup subroutine of rdist, for
which an exploitation script is available. Vendor information and
a pointer to a new version of rdist are included.
CA-96.15.Solaris_KCMS_vul 07/31/96
This advisory describes a vulnerability in the Solaris 2.5 kcms
programs and suggests a workaround.
CA-96.16.Solaris_admintool_vul 08/05/96
This advisory describes a vulnerability in the Solaris admintool and
gives a workaround.
CA-96.17.Solaris_vold_vul 08/06/96
This advisory describes a vulnerability in the Solaris volume
management daemon (vold) and gives a workaround.
CA-96.18.fm_fls 08/14/96
This advisory reports a configuration problem in the
floating license server for Adobe FrameMaker (fm_fls).
A workaround is provided.
CA-96.19.expreserve 08/15/96
** This advisory supersedes CA-93:09 and CA-93:09a. **
It provides information about a vulnerability in the expreserve
utility. A workaround and vendor information are included.
CA-96.20.sendmail_vul 09/18/96
This advisory describes a vulnerability in all versions of sendmail prior
to 8.7.6, and includes a workaround and patch information.
CA-96.21.tcp_syn_flooding 09/19/96
** This advisory supersedes the IP spoofing portion of CA-95:01. **
It describes denial-of-service attacks through TCP SYN flooding and
IP spoofing. Advice about filtering is included.
CA-96.22.bash_vuls 10/08/96
This advisory addresses two problems with the GNU Project's
Bourne Again SHell (bash): one in yy_string_get() and one in
yy_readline_get().
CA-96.23.workman_vul 10/28/96
This advisory describes a vulnerability in the WorkMan compact
disc-playing program that affects UNIX System V Release 4.0 and
derivatives and Linux systems.
CA-96.24.sendmail.daemon.mode 11/21/96
It describes a security problem relating to the daemon mode in
sendmail 8.7 through 8.8.2. The advisory also includes a note about
two vulnerabilities in versions 8.8.0 and 8.8.1; these have been
fixed as well.
CA-96.25.sendmail_groups 12/10/96
The advisory describes a security problem affecting sendmail
version 8 relating to group-writable files. Vendor patches and
a workaround are included.
CA-96.26.ping 12/18/96
This advisory describes a denial-of-service attack using large ICMP
datagrams issued via the ping command. Vendor information is included.
CA-96.27.hp_sw_install 12/19/96
This advisory describes a vulnerability in Hewlett-Packard SD-UX that
may allow local users to gain root privileges. A workaround is included.
CA-97.01.flex_lm 01/06/97
This advisory describes multi-platform UNIX FLEXlm
vulnerabilities. These problems may allow local users to create
arbitrary files on the system and execute arbitrary programs using the
privileges of the user running the FLEXlm daemons.
CA-97.02.hp_newgrp 01/07/97
This advisory describes a vulnerability in the newgrp(1) program under
HP-UX 9.x and 10.x that may allow users to gain root privileges. A
workaround is provided.
CA-97.03.csetup 01/08/97
A vulnerability in the csetup program under IRIX versions 5.x, 6.0,
6.0.1, 6.1, and 6.2 allows local users to create or overwrite arbitrary
files on the system and ultimately gain root privileges. A workaround
is provided.
CA-97.04.talkd 01/27/97
A vulnerability in talkd(8) program used by talk(1) makes it
possible to provide corrupt DNS information to a host and
to remotely execute arbitrary commands with root privileges.
The advisory includes information on how to solve the general
problem as well as the specific one.
CA-97.05.sendmail 01/28/97
This advisory addresses a MIME conversion buffer overflow in
sendmail versions 8.8.3 and 8.8.4. The advisory includes vendor
information, pointers to the latest version of sendmail, a workaround,
and general precautions to take when using sendmail.
CA-97.06.rlogin-term 02/06/97
This advisory reports a vulnerability in many implementations of the
rlogin program, including eklogin and klogin. Vendor information and a
workaround are included.
OTHER FILES in ftp://info.cert.org/pub/cert_advisories
01-README
This file.
cert-article
An article about CERT from the March 1990 issue of Bridge, a
magazine published by the Software Engineering Institute (SEI).
cert.press.release.dec88
The DARPA press release issued on December 6, 1988 announcing the
formation of the original team, which evolved into the CERT Coordination
Center.
xterm-patch-status
A status file containing vendor information relating to the
xterm vulnerability described in the CA-93:17.xterm.logging.vulnerability
advisory.
For more information on the CERT(sm) Coordination Center and on computer and
information security, see
ftp://info.cert.org/pub/
http://www.cert.org
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMvdq3XVP+x0t4w7BAQF8YwQAmkde6t17i8CrVf4r/tnQFwe0xhCy2x/N
Trqv3CKCUu26zUBGmVyapzmYPp34SumvOPlFN6U6iMhX1rET/CGSB02CN4xMWD0l
/F6aTRvqrumiMSR1Q3BELGJT8NPkeEWOfDnyPxnZXY75vI2v9kK5Uf+jEd4Qom84
i6ZW4rGnBsU=
=teqk
-----END PGP SIGNATURE-----