Status: Entry Reference: NAI: NAI-29 Reference: CERT: CA-98.11.tooltalk Reference: SGI:19981101-01-A Reference: URL:ftp://com/support/free/security/advisories/19981101-01-A Reference: SGI:19981101-01-PX Reference: URL:ftp://com/support/free/security/advisories/19981101-01-PX Reference: XF:aix-ttdbserver Reference: XF:tooltalk Reference: BID:122 Reference: URL: Description: MIME buffer overflow in email clients, e.g. Status: Candidate Phase: Modified (19990621-01) Reference: CERT: CA-98.10.mime_buffer_overflows Reference: XF:outlook-long-name Reference: SUN:00175 Reference: MS: MS98-008 Reference: URL: This issue seems to have been rediscovered in BUGTRAQ:20000515 Eudora Pro & Outlook Overflow - too long filenames again

l=bugtraq&m=95842482413076&w=2 Also see BUGTRAQ:19990320 Eudora Attachment Buffer Overflow

Our Word of the Year choice serves as a symbol of each year’s most meaningful events and lookup trends.

msn live messenger 8 5 1302 1018 works without updating-30

So, take a stroll down memory lane to remember all of our past Word of the Year selections.

Candidates must be reviewed and accepted by the CVE Editorial Board before they can be added to the official CVE list.

The Free BSD patch for CVE-1999-0052 is in line 750.

So, CVE-1999-0257 and CVE-1999-0052 may be the same, though CVE-1999-0052 should be RECAST since this bug affects Linux and other OSes besides Free BSD.

Frech The description for BID:190, which links to CVE-1999-0052 (a Free BSD advisory), notes that the patches provided by Free BSD in CERT: CA-1998-13 suggest a connection between CVE-1999-0001 and CVE-1999-0052.

CERT: CA-1998-13 is too vague to be sure without further analysis.

Thus CD: SF-LOC suggests that the problems keep separate candidates because one problem appears in a different version than the other.

Christey BID:124 Consider MSKB: Q154174 BUGTRAQ:19971113 Linux IP fragment overlap bug Description: Land IP denial of service. Teardrop_Land Reference: FREEBSD: Free BSD-SA- Reference: HP: HPSBUX9801-076 Reference: URL: Display.do?

Status: Entry Reference: CERT: CA-96.09statd Reference: XF:rpc-stat Reference: SUN:00135 Reference: URL: