Buffer overflow in the socket_getline function in Newspost 2.1.1 and earlier allows remote malicious NNTP servers to execute arbitrary code via a long string without a newline character.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/19178 | vdb entry |
http://security.gentoo.org/glsa/glsa-200502-05.xml | patch vendor advisory |
http://people.freebsd.org/~niels/issues/newspost-20050114.txt | exploit vendor advisory |
http://secunia.com/advisories/14098 | third party advisory |
http://marc.info/?l=bugtraq&m=110746336728781&w=2 | mailing list |
http://secunia.com/advisories/14092/ | third party advisory vendor advisory |
http://securitytracker.com/id?1013056 | vdb entry |
http://www.vuxml.org/freebsd/7f13607b-6948-11d9-8937-00065be4b5b6.html | vendor advisory |
http://www.securityfocus.com/bid/12418 | vdb entry |