First published: Sun Jan 03 1999(Updated: )
Buffer overflow in the bootp server in the Debian Linux netstd package.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =1.1 | |
Debian Linux | =1.2 | |
Debian Linux | =1.3 | |
Debian Linux | =1.3.1 | |
Debian Linux | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0389 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-1999-0389, you should upgrade to a patched version of the Debian netstd package that addresses the buffer overflow issue.
The impact of CVE-1999-0389 includes unauthorized access and potential control over affected systems due to the buffer overflow in the bootp server.
CVE-1999-0389 affects Debian GNU/Linux versions 1.1, 1.2, 1.3, 1.3.1, and 2.0.
There are no published workarounds for CVE-1999-0389; the recommended mitigation is to upgrade to a secure version.