First published: Fri Dec 04 1998(Updated: )
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BSDI BSD/OS | ||
FreeBSD Kernel | =6.2-stable | |
OpenBSD | =2.3 | |
OpenBSD | =2.4 | |
Red Hat Linux | ||
SCO Internet FastStart | ||
Xinuos OpenServer | ||
Xinuos UnixWare | =7.0 | |
Xinuos UnixWare | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0798 has a high severity level due to its buffer overflow vulnerability that can allow remote exploitation.
To fix CVE-1999-0798, update your affected operating system to the latest patched version provided by your vendor.
CVE-1999-0798 affects OpenBSD, FreeBSD, and various Linux distributions such as Red Hat and SCO systems.
CVE-1999-0798 is a buffer overflow vulnerability that occurs through malformed header types in bootpd.
Yes, CVE-1999-0798 can be exploited remotely due to the nature of the buffer overflow in bootpd.