Reference: CERT:CA-98.10.mime_buffer_overflowsĪCCEPT(8) Baker, Cole, Collins, Dik, Landfield, Magdych, Northcutt, Wallįrech> Extremely minor, but I believe e-mail is the correct term. MIME buffer overflow in email clients, e.g. ![]() CERT:CA-1998-13 is too vague to be sure withoutįurther analysis. This assignment was based solely on references to the CERT advisory.Ĭhristey> The description for BID:190, which links to CVE-1999-0052 (aįreeBSD advisory), notes that the patches provided by FreeBSD inĬERT:CA-1998-13 suggest a connection between CVE-1999-0001 andĬVE-1999-0052. So, CVE-1999-0257 and CVE-1999-0052 may be the same, thoughĬVE-1999-0052 should be RECAST since this bug affects Linux The FreeBSD patch for CVE-1999-0052 is in line 750. The patch for nestea is in ip_input.c around line 750. To nestea (CVE-1999-0257) and probably the one described inīUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release "short packets with certain options set," so the descriptionīut is this the same as CVE-1999-0052? That one is related Reference: CERT:CA-98-13-tcp-denial-of-serviceĬhristey> A Bugtraq posting indicates that the bug has to do with Reference: BUGTRAQ:19981223 Re: CERT Advisory CA-98.13 - TCP/IP Denial of Service ![]() Ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |