First published: Mon Jan 04 1999(Updated: )
Buffer overflow in Dosemu Slang library in Linux.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
Red Hat Linux | =4.2 | |
Red Hat Linux | =5.0 | |
Red Hat Linux | =5.1 | |
Red Hat Linux | =5.2 | |
SUSE Linux | =5.0 | |
SUSE Linux | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0390 has a high severity level due to the potential for a buffer overflow, which can allow attackers to execute arbitrary code.
To fix CVE-1999-0390, apply the latest patches provided by your Linux distribution, such as Red Hat or SUSE.
CVE-1999-0390 affects various versions of Red Hat Linux (4.0, 4.1, 4.2, 5.0, 5.1, 5.2) and SUSE Linux (5.0, 5.1).
In the context of CVE-1999-0390, a buffer overflow occurs when the Dosemu Slang library processes data larger than the buffer can handle, leading to memory corruption.
Yes, there are known exploits for CVE-1999-0390 that leverage the buffer overflow vulnerability to gain unauthorized access or execute code.