User:Fabrickator/cert.org path change

Carnegie Mellon Software Engineering Institute's cert.org site has undergone some changes. Though the home page on cert.org and www.cert.org will redirect to www.sei.cmu.edu, the "advisories" directory remains available, but unfortunately, the content of the pages has been changed, and not in a good way.

One example of this is http://www.cert.org/advisories/CA-2001-13.html. The preferred url to replace this is https://www.kb.cert.org/vuls/id/952336 ... this is suggested because it actually contains relevant content whereas http://www.cert.org/advisories/CA-2001-13.html will force you to take additional steps to find the relevant content!

I'm not sure we should be considering the vulnerability id link as preferred. It seems these pages have links to the CERT advisory, but that link redirects to a page that takes you to the annual consolidated advisories, which is just annoying. There's little we can do other than whine about it, I suppose, assuming we want to reference the vulnerability pages. I consider those consolidated advisories to be "unfit" for purposes of providing a link to a specific advisory.

An alternative approach would be to specify an archived url and indicate the uselessness of the live url with url-status=unfit.

Here are the affected pages:

reference table

The following stanzas provide the following information:

  • advisory id
  • advisory name
  • original url for the advisory
  • working url 1
  • working url ...


CA-1989-04
WANK Worm On SPAN Network
http://www.cert.org/advisories/CA-1989-04.html
https://web.archive.org/web/20001218104500/http://www.cert.org/advisories/CA-1989-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1989_019_001_496236.pdf#page=14

CA-1992-02
Michelangelo PC Virus Warning
http://www.cert.org/advisories/CA-1992-02.html
https://web.archive.org/web/20010116102700/http://www.cert.org/advisories/CA-1992-02.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1992_019_001_496266.pdf#page=6

CA-1996-01
UDP Port Denial-of-Service Attack
http://www.cert.org/advisories/CA-1996-01.html
https://web.archive.org/web/20010124064800/http://www.cert.org/advisories/CA-1996-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=5

CA-1996-06
Vulnerability in NCSA/Apache CGI example code
http://www.cert.org/advisories/CA-1996-06.html
http://web.archive.org/web/20010407070533/http://www.cert.org/advisories/CA-1996-06.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=34

CA-1996-20
Sendmail Vulnerabilities
http://www.cert.org/advisories/CA-1996-20.html
http://web.archive.org/web/20010420201453/http://www.cert.org/advisories/CA-1996-20.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=111

CA-1996-21
TCP SYN Flooding and IP Spoofing Attacks
https://www.cert.org/advisories/CA-1996-21.html
http://web.archive.org/web/20001017145139/https://www.cert.org/advisories/CA-1996-21.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=123

CA-1996-24 Sendmail Daemon Mode Vulnerability
http://www.cert.org/advisories/CA-1996-24.html
https://web.archive.org/web/20001214122100/http://www.cert.org/advisories/CA-1996-24.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=139

CA-1996-25
Sendmail Group Permissions Vulnerability
http://www.cert.org/advisories/CA-1996-25.html
https://web.archive.org/web/20010123074100/http://www.cert.org/advisories/CA-1996-25.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=149

CA-1997-05
MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4
http://www.cert.org/advisories/CA-1997-05.html
https://web.archive.org/web/20010404232440/http://www.cert.org/advisories/CA-1997-05.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=31

CA-1997-27
FTP Bounce Attack
http://www.cert.org/advisories/CA-1997-27.html
https://web.archive.org/web/20021002034218/http://www.cert.org/advisories/CA-1997-27.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=170

CA-1997-28
IP Denial-of-Service Attacks
http://www.cert.org/advisories/CA-1997-28.html
https://web.archive.org/web/20011118030102/http://www.cert.org/advisories/CA-1997-28.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=180

CA-1999-01
Trojan horse version of TCP Wrappers
http://www.cert.org/advisories/CA-1999-01.html
http://web.archive.org/web/20001017170613/http://www.cert.org/advisories/CA-1999-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=5

CA-1999-02
Trojan Horses
http://www.cert.org/advisories/CA-1999-02.html
https://web.archive.org/web/20001017172300/http://www.cert.org/advisories/CA-1999-02.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=14

CA-2000-04
Love Letter Worm
http://www.cert.org/advisories/CA-2000-04.html
https://web.archive.org/web/20000510145139/http://www.cert.org/advisories/CA-2000-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2000_019_001_496188.pdf#page=17

CA-2001-01
Interbase Server Contains Compiled-in Back Door Account
http://www.cert.org/advisories/CA-2001-01.html
https://web.archive.org/web/20010124071700/http://www.cert.org/advisories/CA-2001-01.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=5

CA-2001-04
Unauthentic "Microsoft Corporation" Certificates
http://www.cert.org/advisories/CA-2001-04.html
https://web.archive.org/web/20010331083920/http://www.cert.org/advisories/CA-2001-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=27

CA-2001-09
Statistical Weaknesses in TCP/IP Initial Sequence Numbers
http://www.cert.org/advisories/CA-2001-09.html
https://web.archive.org/web/20050404004054/http://www.cert.org/advisories/CA-2001-09.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=51

CA-2001-11
sadmind/IIS Worm"
http://www.cert.org/advisories/CA-2001-11.html
http://web.archive.org/web/20011107035310/http://www.cert.org/advisories/CA-2001-11.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=69

CA-2001-13
Buffer Overflow In IIS Indexing Service DLL
http://www.cert.org/advisories/CA-2001-13.html
https://web.archive.org/web/20020124093955/http://www.cert.org/advisories/CA-2001-13.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=76

CA-2001-19
"code red" worm exploiting buffer overflow in iis indexing service dll
http://www.cert.org/advisories/CA-2001-19.html
https://web.archive.org/web/20020603123658/http://www.cert.org/advisories/CA-2001-19.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=101

CA-2001-26
Nimda Worm
http://www.cert.org/advisories/CA-2001-26.html
https://web.archive.org/web/20011014191001/http://www.cert.org/advisories/CA-2001-26.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=133

CA-2002-22
Multiple Vulnerabilities in Microsoft SQL Server
http://www.cert.org/advisories/CA-2002-22.html
https://web.archive.org/web/20030207175347/http://www.cert.org/advisories/CA-2002-22.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2002_019_001_496196.pdf#page=226

CA-2003-04
MS-SQL Server Worm
http://www.cert.org/advisories/CA-2003-04.html
https://web.archive.org/web/20030201230443/http://www.cert.org/advisories/CA-2003-04.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=20

CA-2003-07
Remote Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-07.html
https://web.archive.org/web/20030806195539/http://www.cert.org/advisories/CA-2003-07.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=40

CA-2003-12
Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-12.html
https://web.archive.org/web/20030602094321/http://www.cert.org/advisories/CA-2003-12.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=70

CA-2003-20
W32/Blaster worm
http://www.cert.org/advisories/CA-2003-20.html
https://web.archive.org/web/20031008182946/http://www.cert.org/advisories/CA-2003-20.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=99

CA-2003-25 (VU#108964)
Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-25.html
https://web.archive.org/web/20031205060231/http://www.cert.org/advisories/CA-2003-25.html
https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=122

TA06-081A
Sendmail Race Condition Vulnerability
https://www.us-cert.gov/ncas/archives/alerts/TA06-081A
Retrieved from "https://en.wikipedia.org/w/index.php?title=User:Fabrickator/cert.org_path_change&oldid=919942209"