what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

safemode-adv-mnews.txt

safemode-adv-mnews.txt
Posted Jun 3, 2002
Authored by Zillion | Site safemode.org

Safemode Security Advisory SRT2002-04-31-1159 - Several local and remote overflows have been found in the Mnews package v1.22 and below.

tags | remote, overflow, local
SHA-256 | 34e50c77bf1364ae80884b5a9c0e02f0f32770926beb9492611db880bf70ab98

safemode-adv-mnews.txt

Change Mirror Download
======================================================================

Strategic Reconnaissance Team Security Advisory (SRT2002-04-31-1159)

Topic : Mnews local and remote overflow vulnerabilities
Date : May 31, 2002
Credit : zillion[at]safemode.org
Site : http://www.snosoft.com

======================================================================

.: Description:
---------------

Mnews is a small console based email and news client which is often
installed setgid mail. Several local and remote overflows have been
identified in this package.

Local overflows where found in the -f, -n, -D, -M, -P parameters and
in the JNAMES, MAILSERVER environment variables. The remote overflow
resides in the code responsible for processing responses received from
the NNTP server. For example the following response will result in an
overflow:

200 <a x 770>

If you look at the source code of mnews you will see that this package
is very outdated and dangerous to use on todays Internet.

.: Impact:
----------

Local users might be able to elevate their privileges on the affected
systems. Remote malicious server owners can use mnews to penetrate an
affected system.

We strongly recommend to stop using mnews.

.: Systems Affected:
--------------------

Systems running the mnews package version 1.22 are affected. It is
very likely that older versions are also affected.

.: Proof of Concept:
--------------------

A working exploit that illustrates the danger of this package will
be released soon.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close