Bug 12814

Summary: Buffer owerflow in slrnpull
Product: [Retired] Red Hat Linux Reporter: Joachim Blaabjerg <styx>
Component: slrnAssignee: Bill Nottingham <notting>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: high    
Version: 6.2CC: rvokal
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2000-06-22 17:57:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Joachim Blaabjerg 2000-06-22 17:57:55 UTC
Slrnpull is a companion program for the slrn newsreader that allows a user 
to retrieve news from an NNTP server to read offline. There is a buffer 
overflow while processing the NNTPSERVER environment variable that may 
allow an attacker obtain extra privileges. Since slrnpull is installed 
setgid 'news' this would allow an attacker to access the news spool and 
disrupt usenet news service.

StyX

Comment 1 Bill Nottingham 2000-06-22 18:00:16 UTC

*** This bug has been marked as a duplicate of 12750 ***

Comment 2 SB 2000-06-22 18:34:05 UTC
This is NOT A SECURITY THREAT!!!  Someone needs to go shove a pole up
Michal Zalewski's ass for reporting this as a security threat in
Red Hat linux 6.2 and 6.1 because regular users CAN'T EVEN EXECUTE
SLRNPULL because of it's permissions.  If he had actually read my
bugzilla posts instead of just skimming the contents before he took
credit for finding them he would have noticed the permission on
slrnpull which he did not, which makes it hard to believe he actually
found this and tested it on his own.  It takes all kinds...

-Stan Bubrouski