An error occurred while updating the firmware 6721
Status: Candidate Phase: Modified (20051217) Reference: CERT: CA-98-13-tcp-denial-of-service Reference: BUGTRAQ:19981223 Re: CERT Advisory CA-98.13 - TCP/IP Denial of Service Reference: CONFIRM: Reference: OSVDB:5707 Reference: URL: Votes: A Bugtraq posting indicates that the bug has to do with "short packets with certain options set," so the description should be modified accordingly. That one is related to nestea (CVE-1999-0257) and probably the one described in BUGTRAQ:19981023 nestea v2 against freebsd 3.0-Release The patch for nestea is in ip_input.c around line 750.The patches for CVE-1999-0001 are in lines 388&446.
Status: Entry Reference: CERT: CA-98.05.bind_problems Reference: SGI:19980603-01-PX Reference: URL:ftp://com/support/free/security/advisories/19980603-01-PX Reference: HP: HPSBUX9808-083 Reference: URL: Display.do? Web Servers Reference: XF:nt-web8.3 Description: Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.doc Id=HPSBUX9808-083 Reference: SUN:00180 Reference: URL: doctype=coll&doc=secbull/180 Reference: XF:bind-axfr-dos Description: Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. Status: Entry Reference: CERT: CA-98.03.ssh-agent Reference: NAI: NAI-24 Reference: XF:ssh-agent Description: Unauthorized privileged access or denial of service via dtappgather program in CDE.Status: Entry Reference: HP: HPSBUX9801-075 Reference: URL: Display.do? Status: Candidate Phase: Modified (20090302) Reference: CERT: CA-97.28.Status: Entry Reference: BUGTRAQ:19971010 Security flaw in (wwwcount) Reference: CERT: CA-97.24.Count_cgi Reference: XF:http-cgi-count Reference: BID:128 Reference: URL: Description: Local user gains root privileges via buffer overflow in rdist, via expstr() function.
All references and descriptions in this candidate have been removed to prevent accidental usage.