Description
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
Product(s):
- BSDI BSD/OS
- Bsdi Bsd Os -
- Bsdi Bsd Os 1.1
- Bsdi Bsd Os 2.0.1
- Bsdi Bsd Os 2.0
- Bsdi Bsd Os 2.1
- Bsdi Bsd Os 3.0
- Bsdi Bsd Os 3.1
- Bsdi Bsd Os 3.2
- Bsdi Bsd Os 4.0.1
- Bsdi Bsd Os 4.0
- Bsdi Bsd Os 4.1
- Bsdi Bsd Os 4.2
- FreeBSD 6.2 Stable
- OpenBSD 2.3
- OpenBSD 2.4
- Red Hat Linux
- Red Hat Linux 1.0
- Red Hat Linux 1.1
- Red Hat Linux 2.0.34
- Red Hat Linux 2.0
- Red Hat Linux 2.1
- Red Hat Linux 2.4.2
- Red Hat Linux 2.6.2
- Red Hat Linux 3.0.3
- Red Hat linux 3.0
- Red Hat Linux 4.0
- Red Hat Linux 4.1
- Red Hat Linux 4.2
- Red Hat Linux 5.0
- Red Hat Linux 5.1
- Red Hat Linux 5.2
- Red Hat Linux 6.0
- Red Hat Linux 6.1
- Red Hat Linux 6.2
- Red Hat Linux 6.2E
- Red Hat Linux 7.0
- Red Hat Linux 7.1
- Red Hat Linux 7.2
- Red Hat Linux 7.3
- Red Hat Linux 7
- Red Hat Linux 8.0
- Red Hat Linux 9.0
- SCO Internet FastStart
- SCO OpenServer
- SCO UnixWare 7.0.1
- SCO UnixWare 7.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-1999-0798, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-1999-0798 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.