First published: Wed Dec 04 1996(Updated: )
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC INN | =1.4sec | |
ISC INN | =1.4sec2 | |
ISC INN | =1.4unoff3 | |
ISC INN | =1.4unoff4 | |
ISC INN | =1.5 | |
Netscape News Server | =1.1 | |
BSDI BSD/OS | =2.1 | |
SCO OpenLinux Server | =1.0 | |
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
nec goah intrasv | =1.1 | |
nec goah networksv | =1.2 | |
nec goah networksv | =2.2 | |
nec goah networksv | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0043 is categorized with a high severity due to the potential for command execution vulnerabilities.
To mitigate CVE-1999-0043, upgrade to a non-vulnerable version of INN or apply the necessary patches provided by the maintainers.
CVE-1999-0043 affects different versions of the ISC INN daemon including 1.4sec, 1.4sec2, 1.4unoff3, 1.4unoff4, and 1.5.
The risks of CVE-1999-0043 include unauthorized command execution, which can lead to system compromise.
Temporary mitigations for CVE-1999-0043 involve disabling the features that utilize the vulnerable control messages until an update can be applied.