First published: Mon Aug 31 1998(Updated: )
Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =2.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0065 has been classified as having a high severity due to the potential for remote command execution.
To fix CVE-1999-0065, users should update their dtmail software to a version that has addressed the buffer overflow vulnerabilities.
CVE-1999-0065 affects various versions of Sun Solaris and SunOS, including 2.4, 2.5, 2.5.1, 2.6, and specific SunOS versions.
Yes, CVE-1999-0065 can be exploited remotely, allowing attackers to execute commands on vulnerable systems.
The risks associated with CVE-1999-0065 include unauthorized access, data breaches, and complete system compromise.