CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
520 | CVE-1999-0523 | Candidate | ICMP echo (ping) is allowed from arbitrary hosts. | Proposed (19990726) | MODIFY(1) Meunier | NOOP(1) Baker | REJECT(2) Frech, Northcutt | Northcutt> (Though I sympathize with this one :) | CHANGE> [Frech changed vote from REVIEWING to REJECT] | Frech> Ping is a utility that can be run on demand; ICMP echo is a | message | type. As currently worded, this candidate seems as if an arbitrary | host | is vulnerable because it is capable of running an arbitrary program | or | function (in this case, ping/ICMP echo). There are many | programs/functions that | "shouldn"t" be on a computer, from a security admin"s perspective. | Even if this | were a vulnerability, it would be impacted by CD-HIGHCARD. | Meunier> Every ICMP message type presents a vulnerability or an | exposure, if access is not controlled. By that I mean not only those | in RFC 792, but also those in RFC 1256, 950, and more. I think that | the description should be changed to "ICMP messages are acted upon | without any access control". ICMP is an error and debugging protocol. | We complain about vendors leaving testing backdoors in their programs. | ICMP is the equivalent for TCP/IP. ICMP should be in the dog house, | unless you are trying to troubleshoot something. MTU discovery is | just a performance tweak -- it"s not necessary. I don"t know of any | ICMP message type that is necessary if the network is functional. | Limited logging of ICMP messages could be useful, but acting upon them | and allowing the modification of routing tables, the behavior of the | TCP/IP stack, etc... without any form of authentication is just crazy. | View |
519 | CVE-1999-0522 | Candidate | The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate. | Proposed (19990803) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | RECAST(1) Northcutt | Northcutt> Why not say world readable, this is what you do further down in the | file (world exportable in CVE-1999-0554) | Christey> ADDREF AUSCERT:AA-96.02 | View |
518 | CVE-1999-0521 | Candidate | An NIS domain name is easily guessable. | Proposed (19990714) | ACCEPT(4) Baker, Meunier, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:nis-dom | Christey> Consider http://www.cert.org/advisories/CA-1992-13.html | as well as ftp://ciac.llnl.gov/pub/ciac/bulletin/c-fy92/c-25.ciac-sunos-nis-patch | View |
517 | CVE-1999-0520 | Candidate | A system-critical NETBIOS/SMB share has inappropriate access control. | Proposed (19990803) | ACCEPT(1) Wall | MODIFY(1) Frech | NOOP(1) Baker | RECAST(1) Northcutt | REJECT(1) LeBlanc | REVIEWING(1) Christey | Northcutt> I think we need to enumerate the shares and or the access control | Christey> One question is, what is "inappropriate"? It"s probably | very dependent on the policy of the enterprise on which | this is found. And should writable shares be different | from readable shares? (Or file systems, mail spools, etc.) | Yes, the impact may be different, but we could have a | large number of entries for each possible type of access. | A content decision (CD:CF-DATA) needs to be reviewed | and accepted by the Editorial Board in order to resolve | this question. | LeBlanc> Unacceptably vague - agree with Christey"s comments. | Frech> associated to: | XF:nt-netbios-everyoneaccess(1) | XF:nt-netbios-guestaccess(2) | XF:nt-netbios-allaccess(3) | XF:nt-netbios-open(15) | XF:nt-netbios-write(19) | XF:nt-netbios-shareguest(20) | XF:nt-writable-netbios(26) | XF:nb-rootshare(393) | XF:decod-smb-password-empty(2358) | View |
516 | CVE-1999-0519 | Candidate | A NETBIOS/SMB share password is the default, null, or missing. | Proposed (19990714) | ACCEPT(5) Baker, LeBlanc, Meunier, Northcutt, Shostack | MODIFY(1) Frech | Frech> Change description term to NetBIOS. | XF:decod-smb-password-empty | XF:nt-netbios-everyoneaccess | XF:nt-netbios-guestaccess | XF:nt-netbios-allaccess | XF:nt-netbios-open | XF:nt-netbios-write | XF:nt-netbios-shareguest | XF:nt-writable-netbios | XF:nt-netbios-everyoneaccess-printer | XF:nt-netbios-share-print-guest | View |
Page 20840 of 20943, showing 5 records out of 104715 total, starting on record 104196, ending on 104200