Tags: singles dating magazinedating find matches personalsemotional factors with dating violenceFree adult camerathe best nude dating sitesFree iphone sex chatssociology point of view on dating
doc Id=HPSBUX9808-083 Reference: SUN:00180 Reference: URL: doctype=coll&doc=secbull/180 Reference: XF:bind-axfr-dos Description: Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. Status: Entry Reference: CERT: CA-98.03.ssh-agent Reference: NAI: NAI-24 Reference: XF:ssh-agent Description: Unauthorized privileged access or denial of service via dtappgather program in CDE.Status: Entry Reference: HP: HPSBUX9801-075 Reference: URL: Display.do? Status: Candidate Phase: Modified (20090302) Reference: CERT: CA-97.28.So, CVE-1999-0001 is different from CVE-1999-0257 and CVE-1999-0052.
Status: Entry Reference: SGI:19981006-01-I Reference: URL:ftp://com/support/free/security/advisories/19981006-01-I Reference: CERT: CA-98.12.mountd Reference: CIAC: J-006 Reference: URL: Reference: BID:121 Reference: URL: Reference: XF:linux-mountd-bo Description: Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Status: Entry Reference: NAI: NAI-29 Reference: CERT: CA-98.11.tooltalk Reference: SGI:19981101-01-A Reference: URL:ftp://com/support/free/security/advisories/19981101-01-A Reference: SGI:19981101-01-PX Reference: URL:ftp://com/support/free/security/advisories/19981101-01-PX Reference: XF:aix-ttdbserver Reference: XF:tooltalk Reference: BID:122 Reference: URL: Description: MIME buffer overflow in email clients, e.g. Status: Candidate Phase: Modified (19990621-01) Reference: CERT: CA-98.10.mime_buffer_overflows Reference: XF:outlook-long-name Reference: SUN:00175 Reference: MS: MS98-008 Reference: URL: This issue seems to have been rediscovered in BUGTRAQ:20000515 Eudora Pro & Outlook Overflow - too long filenames again
Status: Entry Reference: BUGTRAQ:19971010 Security flaw in (wwwcount) Reference: CERT: CA-97.24.
Count_cgi Reference: XF:http-cgi-count Reference: BID:128 Reference: URL: Description: Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Status: Candidate Phase: Modified (20051217) Reference: CERT: CA-98-13-tcp-denial-of-service Reference: BUGTRAQ:19981223 Re: CERT Advisory CA-98.13 - TCP/IP Denial of Service Reference: CONFIRM: Reference: OSVDB:5707 Reference: URL: Votes: A Bugtraq posting indicates that the bug has to do with "short packets with certain options set," so the description should be modified accordingly. That one is related to nestea (CVE-1999-0257) and probably the one described in BUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release The patch for nestea is in ip_input.c around line 750.
The patches for CVE-1999-0001 are in lines 388&446.
doc Id=HPSBUX9808-083 Reference: XF:bind-dos Description: Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Status: Entry Reference: CERT: CA-98.05.bind_problems Reference: SGI:19980603-01-PX Reference: URL:ftp://com/support/free/security/advisories/19980603-01-PX Reference: HP: HPSBUX9808-083 Reference: URL: Display.do? Web Servers Reference: XF:nt-web8.3 Description: Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Status: Entry Reference: CERT: CA-97.26.statd Reference: AUSCERT: AA-97.29 Reference: XF:statd Reference: BID:127 Reference: URL: Description: Delete or create a file via rpc.statd, due to invalid information.
Status: Entry Reference: CERT: CA-96.09statd Reference: XF:rpc-stat Reference: SUN:00135 Reference: URL: