14 results (0.005 seconds)

CVSS: 6.8EPSS: 0%CPEs: 17EXPL: 0

The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación STARTTLS en nnrpd en INN antes de v2.5.3 no restringe correctamente el búfer de E/S, lo que permite a atacantes man-in-the-middle introducir comandos en sesiones cifradas mediante el envío de un comando en texto plano que se procesa después de se establezca el TLS, relacionado con un ataque de "inyección de comando en texto claro", un problema similar a CVE-2011-0411. • http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html http://secunia.com/advisories/50661 http://www.mandriva.com/security/advisories?name=MDVSA-2012:156 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 94%CPEs: 1EXPL: 0

Buffer overflow in the ARTpost function in art.c in the control message handling code for INN 2.4.0 may allow remote attackers to execute arbitrary code. Desbordamiento de búfer en el código de control del mensaje en INN 2.4.0 puede permitir que atacantes remotos ejecuten código arbitrario. • http://archives.neohapsis.com/archives/bugtraq/2004-01/0063.html http://archives.neohapsis.com/archives/bugtraq/2004-01/0064.html http://secunia.com/advisories/10578 http://www.kb.cert.org/vuls/id/759020 http://www.securityfocus.com/bid/9382 http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.365791 https://exchange.xforce.ibmcloud.com/vulnerabilities/14190 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 2

Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses. • https://www.exploit-db.com/exploits/21375 http://archives.neohapsis.com/archives/bugtraq/2002-04/0140.html http://www.iss.net/security_center/static/8834.php http://www.securityfocus.com/bid/4501 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 7

Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument. • https://www.exploit-db.com/exploits/20777 https://www.exploit-db.com/exploits/20778 https://github.com/alt3kx/CVE-2001-1442 http://archives.neohapsis.com/archives/bugtraq/2001-04/0311.html http://securitytracker.com/id?1001353 http://www.kb.cert.org/vuls/id/943536 http://www.securityfocus.com/archive/1/178011 http://www.securityfocus.com/bid/2620 https://exchange.xforce.ibmcloud.com/vulnerabilities/6398 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 1

Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article. Desbordamiento de buffer en INN 2.2.1 y anteriores permite a un atacante remoto causar denegación de servicio mediante un articulo formateado maliciosamente. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-038.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce_34.html http://www.securityfocus.com/bid/1249 •