 ------------------------------------------------------------------------

 Subject:

 VU#158499 VU#510235 VU#846307 VU#671627 VU#836275 VU#600699 VU#320067
 VU#931579 VU#193347 VU#435611 VU#202939 VU#693803 VU#569987 VU#584243
 VU#567963 VU#592515 VU#448987 VU#437899 VU#531355 VU#416427 VU#177067
 VU#864083 VU#137555
 From:

 "CERT(R) Coordination Center" <cert@cert.org>
 Date:

 Fri, 12 Jul 2002 09:01:00 -0400 .
 To:

 KF <dotslash@snosoft.com>


 -----BEGIN PGP SIGNED MESSAGE-----

 Hello Kevin & Simon,

 Alright, let's see here. I've revised the list, let me know what you
 think. As soon as I get your approval that the list looks ok, I'll
 send it off to Compaq so they can start tracking these as multiple
 VU#'s.

 Also, I'll probably end up getting rid of VU#193347, based on your
 recent mail message. Also, each one of these will end up having a
 naming convention similar to VU#177067 and VU#864083.

 For example, VU#671627 will end up getting renamed to:

 Compaq Tru64 "dxchpwd" vulnerable to buffer overflow via long string
 of characters supplied as $NLSPATH environment variable

 Thanks,
 Ian

 Ian A. Finlay
 CERT (R) Coordination Center
 Software Engineering Institute
 Carnegie Mellon University
 Pittsburgh, PA  USA  15213-3890

 VU#158499 - csh vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable
 VU#510235 - dtsession vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#846307 - dxsysinfo vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable
 VU#671627 - dxchpwd vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#836275 - dtaction vulnerable to buffer overflow via long string of characters supplied as "-contextDir" command line argument

 VU#600699 - dtprintinfo vulnerable to buffer overflow via long string of characters supplied as "-p" command line argument
 VU#320067 - dtterm vulnerable to heap overflow via long string of characters supplied as "-tn" command line argument

 VU#931579 - dxterm vulnerable to heap overflow via long string of characters supplied as "-customization" command line argument

 VU#193347 - Compaq Tru64 non-executeable stack contains buffer overflow in SIA libraries

 VU#435611 - /usr/bin/at command vulnerable to buffer overflow via long string of characters supplied as command line argument

 VU#202939 - dtterm vulnerable to buffer overflow via long string of characters supplied as "DISPLAY" environment variable

 VU#693803 - dxpause contains buffer overflow in _XKB_CHARSET library

 VU#569987 - dxconsole contains buffer overflow in _XKB_CHARSET library

 VU#584243 - dtsession contains buffer overflow in _XKB_CHARSET library

 VU#567963 - imapd vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#592515 - inc vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#448987 - uucp vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#437899 - uux vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#531355 - rdist vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#416427 - deliver vulnerable to buffer overflow via long string of characters supplied as $NLSPATH environment variable

 VU#177067 - Compaq Tru64 "/usr/bin/passwd" vulnerable to buffer overflow via long string of characters

 VU#864083 - Compaq Tru64 "/bin/chsh" vulnerable to buffer overflow via long string of characters

 VU#137555 - chfn vulnerable to buffer overflow via long string of character supplied as command line argument






 -----BEGIN PGP SIGNATURE-----
 Version: PGPfreeware 5.0i for non-commercial use
 Charset: noconv

 iQCVAwUBPS7lSaCVPMXQI2HJAQFkNAP/eR2dDqtujsiPmzqjpnXQgwGWMninQJC/
 mWmENlnVHBwV66rMFAInro/pFSi0NqB8A7lSKFnLlpPcXDr047BCEZPnNpz561ss
 K4JehrQVhhahSWAiOLRekIvYjX83sXX/2I0gPQWHb2bRIuE0XSU3o0EQq6enW7JW
 JXZqrJSTz14=
 =X/Ke
 -----END PGP SIGNATURE-----


