named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/8966 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/80 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/8966 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/80 | Exploit Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/8966 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/80 - Exploit, Patch, Vendor Advisory |
Information
Published : 1998-04-10 04:00
Updated : 2024-11-20 23:31
NVD link : CVE-1999-1499
Mitre link : CVE-1999-1499
CVE.ORG link : CVE-1999-1499
JSON object : View
Products Affected
isc
- bind
CWE