dating vienna - Groupwise inbox not updating

Status: Entry Reference: CERT: CA-98.09.imapd Reference: SUN:00177 Reference: URL:

doctype=coll&doc=secbull/177 Reference: BID:130 Reference: URL: Reference: XF:imap-authenticate-bo Description: Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.

groupwise inbox not updating-36

Status: Candidate Phase: Modified (20051217) Reference: CERT: CA-98-13-tcp-denial-of-service Reference: BUGTRAQ:19981223 Re: CERT Advisory CA-98.13 - TCP/IP Denial of Service Reference: CONFIRM: Reference: OSVDB:5707 Reference: URL: Votes: A Bugtraq posting indicates that the bug has to do with "short packets with certain options set," so the description should be modified accordingly. That one is related to nestea (CVE-1999-0257) and probably the one described in BUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release The patch for nestea is in ip_input.c around line 750.

The patches for CVE-1999-0001 are in lines 388&446.

Status: Entry Reference: CERT: CA-97.26.statd Reference: AUSCERT: AA-97.29 Reference: XF:statd Reference: BID:127 Reference: URL: Description: Delete or create a file via rpc.statd, due to invalid information.

Status: Entry Reference: CERT: CA-96.09statd Reference: XF:rpc-stat Reference: SUN:00135 Reference: URL:

They are provided for use by individuals who have a need for an early numbering scheme for items that have not been fully reviewed by the Editorial Board.

Description: ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.

So, CVE-1999-0001 is different from CVE-1999-0257 and CVE-1999-0052.

The Free BSD patch for CVE-1999-0052 is in line 750.

doc Id=HPSBUX9808-083 Reference: SUN:00180 Reference: URL: doctype=coll&doc=secbull/180 Reference: CERT: CA-98.05.bind_problems Reference: XF:bind-bo Reference: BID:134 Reference: URL: Description: Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.

Status: Entry Reference: CERT: CA-98.05.bind_problems Reference: SGI:19980603-01-PX Reference: URL:ftp://com/support/free/security/advisories/19980603-01-PX Reference: HP: HPSBUX9808-083 Reference: URL: Display.do?

doc Id=HPSBUX9808-083 Reference: SUN:00180 Reference: URL: doctype=coll&doc=secbull/180 Reference: XF:bind-axfr-dos Description: Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. Status: Entry Reference: CERT: CA-98.03.ssh-agent Reference: NAI: NAI-24 Reference: XF:ssh-agent Description: Unauthorized privileged access or denial of service via dtappgather program in CDE.

Tags: , ,