First published: Thu Oct 19 1995(Updated: )
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
bsdi bsd os | =2.0 | |
bsdi bsd os | =2.0.1 | |
Convex Convexos | =10.1 | |
Convex Convexos | =10.2 | |
Convex Convexos | =11.0 | |
Convex Convexos | =11.1 | |
Convex Spp-ux | =3 | |
Cray UNICOS | =8.0 | |
Cray UNICOS | =8.3 | |
Cray UNICOS | =9.0 | |
IBM AIX | =3.2 | |
IBM AIX | =4.1 | |
Oracle Solaris SPARC | =2.4 | |
Sun SunOS | =4.1.3 | |
Sun SunOS | =4.1.3u1 | |
Sun SunOS | =4.1.4 | |
Sun SunOS | =5.3 | |
Sun SunOS | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0099 has been classified as a high severity vulnerability due to its potential to allow local or remote attackers to gain root privileges.
To fix CVE-1999-0099, it is recommended to update the affected software packages to the latest version that patches the buffer overflow vulnerability.
CVE-1999-0099 affects multiple versions of BSDi, Convex OS, Cray UNICOS, IBM AIX, and Sun Solaris.
Yes, CVE-1999-0099 can be exploited remotely if the vulnerable syslog service is exposed to an untrusted network.
If exploited, an attacker could execute arbitrary code with root privileges, potentially compromising the entire system.