CVE-1999-1228

Various modems that do not implement a guard time, or are configured with a guard time of 0, can allow remote attackers to execute arbitrary modem commands such as ATH, ATH0, etc., via a "+++" sequence that appears in ICMP packets, the subject of an e-mail message, IRC commands, and others.
Configurations

Configuration 1 (hide)

cpe:2.3:a:logicode:quicktel:28.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:diamond:supra:33.6:*:*:*:*:*:*:*
cpe:2.3:h:diamond:supra:v.90:*:*:*:*:*:*:*
cpe:2.3:h:us_robotics:us_robotics:33.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:30

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=90695973308453&w=2 - () http://marc.info/?l=bugtraq&m=90695973308453&w=2 -
References () http://www.macintouch.com/modemsecurity.html - Vendor Advisory () http://www.macintouch.com/modemsecurity.html - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/3320 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/3320 -

Information

Published : 1998-09-27 04:00

Updated : 2024-11-20 23:30


NVD link : CVE-1999-1228

Mitre link : CVE-1999-1228

CVE.ORG link : CVE-1999-1228


JSON object : View

Products Affected

diamond

  • supra

us_robotics

  • us_robotics

logicode

  • quicktel