Updating catalogs symantec backup exec

All references and descriptions in this candidate have been removed to prevent accidental usage.Status: Candidate Phase: Modified (20050204) Votes: Description: Arbitrary command execution via buffer overflow in (wwwcount) cgi-bin program.CERT: CA-1998-13 is too vague to be sure without further analysis.Description: Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.Status: Entry Reference: BUGTRAQ:19971010 Security flaw in (wwwcount) Reference: CERT: CA-97.24.Count_cgi Reference: XF:http-cgi-count Reference: BID:128 Reference: URL: Description: Local user gains root privileges via buffer overflow in rdist, via expstr() function.

doc Id=HPSBUX9801-076 Reference: CISCO: Reference: XF:cisco-land Reference: XF:land Reference: XF:95-verv-tcp Reference: XF:land-patch Reference: XF:ver-tcpip-sys Description: FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. FTP_bounce Reference: XF:ftp-bounce Reference: XF:ftp-privileged-port Description: Buffer overflow in statd allows root privileges.

doctype=coll&doc=secbull/170 Reference: ISS: June10,1998 Reference: XF:nisd-bo-check Description: Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.

Status: Entry Reference: SGI:19980603-01-PX Reference: URL:ftp://com/support/free/security/advisories/19980603-01-PX Reference: HP: HPSBUX9808-083 Reference: URL: Display.do?

doctype=coll&doc=secbull/135 Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-1999-0032.

Notes: All CVE users should reference CVE-1999-0032 instead of this candidate.

Leave a Reply

Your email address will not be published. Required fields are marked *

One thought on “updating catalogs symantec backup exec”