CVE-1999-1330

The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:30

Type Values Removed Values Added
References () http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html - () http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html -
References () http://marc.info/?l=bugtraq&m=87602661419259&w=2 - () http://marc.info/?l=bugtraq&m=87602661419259&w=2 -
References () http://www.iss.net/security_center/static/7244.php - () http://www.iss.net/security_center/static/7244.php -
References () http://www.redhat.com/support/errata/rh42-errata-general.html#db - () http://www.redhat.com/support/errata/rh42-errata-general.html#db -

Information

Published : 1999-12-31 05:00

Updated : 2024-11-20 23:30


NVD link : CVE-1999-1330

Mitre link : CVE-1999-1330

CVE.ORG link : CVE-1999-1330


JSON object : View

Products Affected

redhat

  • linux

debian

  • debian_linux