User:Fabrickator/cert.org path change
{{about | changes to cert.org paths and was originally published in User:Fabrickator/sandbox on 30 October 2018 |other Wikipedia editing notes |User:Fabrickator/sandbox |section=yes}}
Carnegie Mellon Software Engineering Institute's cert.org site has undergone some changes. Though the home page on cert.org and www.cert.org will redirect to www.sei.cmu.edu, the "advisories" directory remains available, but unfortunately, the content of the pages has been changed, and not in a good way.
One example of this is http://www.cert.org/advisories/CA-2001-13.html. The preferred url to replace this is https://www.kb.cert.org/vuls/id/952336 ... this is suggested because it actually contains relevant content whereas http://www.cert.org/advisories/CA-2001-13.html will force you to take additional steps to find the relevant content!
: I'm not sure we should be considering the vulnerability id link as preferred. It seems these pages have links to the CERT advisory, but that link redirects to a page that takes you to the annual consolidated advisories, which is just annoying. There's little we can do other than whine about it, I suppose, assuming we want to reference the vulnerability pages. I consider those consolidated advisories to be "unfit" for purposes of providing a link to a specific advisory.
An alternative approach would be to specify an archived url and indicate the uselessness of the live url with url-status=unfit.
Here are the affected pages:
- Application firewall
- Backdoor (computing)
- Blaster (computer worm)
- Certificate authority
- Code Red (computer worm)
- Denial-of-service attack
- FTP bounce attack
- ILOVEYOU
- InterBase
- Internet Information Services
- Michał Zalewski
- Michelangelo (computer virus)
- Nimda
- Sadmind
- Sendmail
- SQL Slammer
- SYN flood
- TCP Wrappers
- Trojan horse (computing)
- UDP flood attack
- WANK (computer worm)
reference table
The following stanzas provide the following information:
- advisory id
- advisory name
- original url for the advisory
- working url 1
- working url ...
CA-1989-04
WANK Worm On SPAN Network
http://www.cert.org/advisories/CA-1989-04.html
https://web.archive.org/web/20001218104500/http://www.cert.org/advisories/CA-1989-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1989_019_001_496236.pdf#page=14
CA-1992-02
Michelangelo PC Virus Warning
http://www.cert.org/advisories/CA-1992-02.html
https://web.archive.org/web/20010116102700/http://www.cert.org/advisories/CA-1992-02.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1992_019_001_496266.pdf#page=6
CA-1996-01
UDP Port Denial-of-Service Attack
http://www.cert.org/advisories/CA-1996-01.html
https://web.archive.org/web/20010124064800/http://www.cert.org/advisories/CA-1996-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=5
CA-1996-06
Vulnerability in NCSA/Apache CGI example code
http://www.cert.org/advisories/CA-1996-06.html
http://web.archive.org/web/20010407070533/http://www.cert.org/advisories/CA-1996-06.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=34
CA-1996-20
Sendmail Vulnerabilities
http://www.cert.org/advisories/CA-1996-20.html
http://web.archive.org/web/20010420201453/http://www.cert.org/advisories/CA-1996-20.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=111
CA-1996-21
TCP SYN Flooding and IP Spoofing Attacks
https://www.cert.org/advisories/CA-1996-21.html
http://web.archive.org/web/20001017145139/https://www.cert.org/advisories/CA-1996-21.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=123
CA-1996-24 Sendmail Daemon Mode Vulnerability
http://www.cert.org/advisories/CA-1996-24.html
https://web.archive.org/web/20001214122100/http://www.cert.org/advisories/CA-1996-24.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=139
CA-1996-25
Sendmail Group Permissions Vulnerability
http://www.cert.org/advisories/CA-1996-25.html
https://web.archive.org/web/20010123074100/http://www.cert.org/advisories/CA-1996-25.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=149
CA-1997-05
MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4
http://www.cert.org/advisories/CA-1997-05.html
https://web.archive.org/web/20010404232440/http://www.cert.org/advisories/CA-1997-05.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=31
CA-1997-27
FTP Bounce Attack
http://www.cert.org/advisories/CA-1997-27.html
https://web.archive.org/web/20021002034218/http://www.cert.org/advisories/CA-1997-27.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=170
CA-1997-28
IP Denial-of-Service Attacks
http://www.cert.org/advisories/CA-1997-28.html
https://web.archive.org/web/20011118030102/http://www.cert.org/advisories/CA-1997-28.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=180
CA-1999-01
Trojan horse version of TCP Wrappers
http://www.cert.org/advisories/CA-1999-01.html
http://web.archive.org/web/20001017170613/http://www.cert.org/advisories/CA-1999-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=5
CA-1999-02
Trojan Horses
http://www.cert.org/advisories/CA-1999-02.html
https://web.archive.org/web/20001017172300/http://www.cert.org/advisories/CA-1999-02.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=14
CA-2000-04
Love Letter Worm
http://www.cert.org/advisories/CA-2000-04.html
https://web.archive.org/web/20000510145139/http://www.cert.org/advisories/CA-2000-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2000_019_001_496188.pdf#page=17
CA-2001-01
Interbase Server Contains Compiled-in Back Door Account
http://www.cert.org/advisories/CA-2001-01.html
https://web.archive.org/web/20010124071700/http://www.cert.org/advisories/CA-2001-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=5
CA-2001-04
Unauthentic "Microsoft Corporation" Certificates
http://www.cert.org/advisories/CA-2001-04.html
https://web.archive.org/web/20010331083920/http://www.cert.org/advisories/CA-2001-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=27
CA-2001-09
Statistical Weaknesses in TCP/IP Initial Sequence Numbers
http://www.cert.org/advisories/CA-2001-09.html
https://web.archive.org/web/20050404004054/http://www.cert.org/advisories/CA-2001-09.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=51
CA-2001-11
sadmind/IIS Worm"
http://www.cert.org/advisories/CA-2001-11.html
http://web.archive.org/web/20011107035310/http://www.cert.org/advisories/CA-2001-11.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=69
CA-2001-13
Buffer Overflow In IIS Indexing Service DLL
http://www.cert.org/advisories/CA-2001-13.html
https://web.archive.org/web/20020124093955/http://www.cert.org/advisories/CA-2001-13.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=76
CA-2001-19
"code red" worm exploiting buffer overflow in iis indexing service dll
http://www.cert.org/advisories/CA-2001-19.html
https://web.archive.org/web/20020603123658/http://www.cert.org/advisories/CA-2001-19.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=101
CA-2001-26
Nimda Worm
http://www.cert.org/advisories/CA-2001-26.html
https://web.archive.org/web/20011014191001/http://www.cert.org/advisories/CA-2001-26.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=133
CA-2002-22
Multiple Vulnerabilities in Microsoft SQL Server
http://www.cert.org/advisories/CA-2002-22.html
https://web.archive.org/web/20030207175347/http://www.cert.org/advisories/CA-2002-22.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2002_019_001_496196.pdf#page=226
CA-2003-04
MS-SQL Server Worm
http://www.cert.org/advisories/CA-2003-04.html
https://web.archive.org/web/20030201230443/http://www.cert.org/advisories/CA-2003-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=20
CA-2003-07
Remote Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-07.html
https://web.archive.org/web/20030806195539/http://www.cert.org/advisories/CA-2003-07.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=40
CA-2003-12
Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-12.html
https://web.archive.org/web/20030602094321/http://www.cert.org/advisories/CA-2003-12.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=70
CA-2003-20
W32/Blaster worm
http://www.cert.org/advisories/CA-2003-20.html
https://web.archive.org/web/20031008182946/http://www.cert.org/advisories/CA-2003-20.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=99
CA-2003-25 (VU#108964)
Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-25.html
https://web.archive.org/web/20031205060231/http://www.cert.org/advisories/CA-2003-25.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=122
TA06-081A
Sendmail Race Condition Vulnerability
https://www.us-cert.gov/ncas/archives/alerts/TA06-081A