Bug 12814 - Buffer owerflow in slrnpull
Summary: Buffer owerflow in slrnpull
Keywords:
Status: CLOSED DUPLICATE of bug 12750
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: slrn
Version: 6.2
Hardware: i386
OS: Linux
high
medium
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-06-22 17:57 UTC by Joachim Blaabjerg
Modified: 2014-03-17 02:14 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2000-06-22 17:57:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Joachim Blaabjerg 2000-06-22 17:57:55 UTC
Slrnpull is a companion program for the slrn newsreader that allows a user 
to retrieve news from an NNTP server to read offline. There is a buffer 
overflow while processing the NNTPSERVER environment variable that may 
allow an attacker obtain extra privileges. Since slrnpull is installed 
setgid 'news' this would allow an attacker to access the news spool and 
disrupt usenet news service.

StyX

Comment 1 Bill Nottingham 2000-06-22 18:00:16 UTC

*** This bug has been marked as a duplicate of 12750 ***

Comment 2 SB 2000-06-22 18:34:05 UTC
This is NOT A SECURITY THREAT!!!  Someone needs to go shove a pole up
Michal Zalewski's ass for reporting this as a security threat in
Red Hat linux 6.2 and 6.1 because regular users CAN'T EVEN EXECUTE
SLRNPULL because of it's permissions.  If he had actually read my
bugzilla posts instead of just skimming the contents before he took
credit for finding them he would have noticed the permission on
slrnpull which he did not, which makes it hard to believe he actually
found this and tested it on his own.  It takes all kinds...

-Stan Bubrouski


Note You need to log in before you can comment on or make changes to this bug.