Bug 12814 - Buffer owerflow in slrnpull
Buffer owerflow in slrnpull
Status: CLOSED DUPLICATE of bug 12750
Product: Red Hat Linux
Classification: Retired
Component: slrn (Show other bugs)
6.2
i386 Linux
high Severity medium
: ---
: ---
Assigned To: Bill Nottingham
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2000-06-22 13:57 EDT by Joachim Blaabjerg
Modified: 2014-03-16 22:14 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-06-22 13:57:56 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Joachim Blaabjerg 2000-06-22 13:57:55 EDT
Slrnpull is a companion program for the slrn newsreader that allows a user 
to retrieve news from an NNTP server to read offline. There is a buffer 
overflow while processing the NNTPSERVER environment variable that may 
allow an attacker obtain extra privileges. Since slrnpull is installed 
setgid 'news' this would allow an attacker to access the news spool and 
disrupt usenet news service.

StyX
Comment 1 Bill Nottingham 2000-06-22 14:00:16 EDT

*** This bug has been marked as a duplicate of 12750 ***
Comment 2 SB 2000-06-22 14:34:05 EDT
This is NOT A SECURITY THREAT!!!  Someone needs to go shove a pole up
Michal Zalewski's ass for reporting this as a security threat in
Red Hat linux 6.2 and 6.1 because regular users CAN'T EVEN EXECUTE
SLRNPULL because of it's permissions.  If he had actually read my
bugzilla posts instead of just skimming the contents before he took
credit for finding them he would have noticed the permission on
slrnpull which he did not, which makes it hard to believe he actually
found this and tested it on his own.  It takes all kinds...

-Stan Bubrouski

Note You need to log in before you can comment on or make changes to this bug.