Vulnerabilities > CVE-2002-0290 - Unspecified vulnerability in Netwin Webnews 1.1H/1.1I/1.1J
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN netwin
nessus
Summary
Buffer overflow in Netwin WebNews CGI program 1.1, Webnews.exe, allows remote attackers to execute arbitrary code via a long group argument.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Nessus
NASL family | CGI abuses |
NASL id | WEBNEWS.NASL |
description | The remote host appears to be running WebNews, which offers web-based access to Usenet news. Some versions of WebNews are prone to a buffer overflow when processing a query string with an overly-long group parameter. An attacker may be able to leverage this issue to execute arbitrary shell code on the remote host subject to the permissions of the web server user id. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11732 |
published | 2003-06-11 |
reporter | This script is Copyright (C) 2003-2018 John Lampe |
source | https://www.tenable.com/plugins/nessus/11732 |
title | Netwin WebNews Webnews.exe Remote Overflow |
code |
|
References
- ftp://netwinsite.com/pub/webnews/beta/webnews11m_solaris.tar.Z
- ftp://netwinsite.com/pub/webnews/beta/webnews11m_solaris.tar.Z
- http://marc.info/?l=bugtraq&m=101413521417638&w=2
- http://marc.info/?l=bugtraq&m=101413521417638&w=2
- http://www.iss.net/security_center/static/8220.php
- http://www.iss.net/security_center/static/8220.php
- http://www.securityfocus.com/bid/4124
- http://www.securityfocus.com/bid/4124