First published: Wed Feb 05 1997(Updated: )
ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =4.1.4 | |
Slackware Slackware Linux | =2.1 | |
Slackware Slackware Linux | =2.2 | |
Sun SunOS | =4.1.3 | |
Slackware Slackware Linux | =2.3 | |
Slackware Linux | =2.1 | |
Slackware Linux | =2.2 | |
Slackware Linux | =2.3 | |
SunOS | =4.1.3 | |
SunOS | =4.1.4 | |
=2.1 | ||
=2.2 | ||
=2.3 | ||
=4.1.3 | ||
=4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0298 is classified as a high-severity vulnerability due to its potential for local and remote exploitation.
To fix CVE-1999-0298, it's recommended to disable the -ypset and -ypsetme options in ypbind or upgrade to a patched version of the software.
CVE-1999-0298 affects Slackware Linux versions 2.1, 2.2, and 2.3, as well as SunOS versions 4.1.3 and 4.1.4.
The attack associated with CVE-1999-0298 involves using a dot dot (..) technique to overwrite files on vulnerable systems.
Yes, exploitation of CVE-1999-0298 can be straightforward for attackers with access to the vulnerable systems.