Vulnerabilities > CVE-2005-0101 - Unspecified vulnerability in Newspost
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the socket_getline function in Newspost 2.1.1 and earlier allows remote malicious NNTP servers to execute arbitrary code via a long string without a newline character.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Newspost 2.1 socket_getline() Remote Buffer Overflow Exploit v2. CVE-2005-0101. Remote exploit for linux platform id EDB-ID:785 last seen 2016-01-31 modified 2005-02-03 published 2005-02-03 reporter cybertronic source https://www.exploit-db.com/download/785/ title Newspost 2.1 - socket_getline Remote Buffer Overflow Exploit 2 description Newspost 2.0/2.1 Remote Buffer Overflow Vulnerability. CVE-2005-0101. Dos exploit for linux platform id EDB-ID:25077 last seen 2016-02-03 modified 2005-02-01 published 2005-02-01 reporter Niels Heinen source https://www.exploit-db.com/download/25077/ title Newspost 2.0/2.1 - Remote Buffer Overflow Vulnerability
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_7F13607B694811D9893700065BE4B5B6.NASL description The newspost program uses a function named socket_getline to read server responses from the network socket. Unfortunately this function does not check the length of the buffer in which the read data is stored and only stops reading when a newline character is found. A malicious NNTP server could use this bug to cause a buffer overflow by sending an overly long response. Such an overflow allows arbitrary code to be executed, with the privileges of the newspost process, on the affected systems. last seen 2020-06-01 modified 2020-06-02 plugin id 19001 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/19001 title FreeBSD : newspost -- server response buffer overflow vulnerability (7f13607b-6948-11d9-8937-00065be4b5b6) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the FreeBSD VuXML database : # # Copyright 2003-2018 Jacques Vidrine and contributors # # Redistribution and use in source (VuXML) and 'compiled' forms (SGML, # HTML, PDF, PostScript, RTF and so forth) with or without modification, # are permitted provided that the following conditions are met: # 1. Redistributions of source code (VuXML) must retain the above # copyright notice, this list of conditions and the following # disclaimer as the first lines of this file unmodified. # 2. Redistributions in compiled form (transformed to other DTDs, # published online in any format, converted to PDF, PostScript, # RTF and other formats) must reproduce the above copyright # notice, this list of conditions and the following disclaimer # in the documentation and/or other materials provided with the # distribution. # # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # include("compat.inc"); if (description) { script_id(19001); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:32:37"); script_cve_id("CVE-2005-0101"); script_name(english:"FreeBSD : newspost -- server response buffer overflow vulnerability (7f13607b-6948-11d9-8937-00065be4b5b6)"); script_summary(english:"Checks for updated package in pkg_info output"); script_set_attribute( attribute:"synopsis", value:"The remote FreeBSD host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "The newspost program uses a function named socket_getline to read server responses from the network socket. Unfortunately this function does not check the length of the buffer in which the read data is stored and only stops reading when a newline character is found. A malicious NNTP server could use this bug to cause a buffer overflow by sending an overly long response. Such an overflow allows arbitrary code to be executed, with the privileges of the newspost process, on the affected systems." ); # http://people.freebsd.org/~niels/issues/newspost-20050114.txt script_set_attribute( attribute:"see_also", value:"https://people.freebsd.org/~niels/issues/newspost-20050114.txt" ); # https://vuxml.freebsd.org/freebsd/7f13607b-6948-11d9-8937-00065be4b5b6.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?b1d5226d" ); script_set_attribute(attribute:"solution", value:"Update the affected package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:newspost"); script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/01/14"); script_set_attribute(attribute:"patch_publication_date", value:"2005/02/01"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"FreeBSD Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info"); exit(0); } include("audit.inc"); include("freebsd_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD"); if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (pkg_test(save_report:TRUE, pkg:"newspost<=2.1.1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200502-05.NASL description The remote host is affected by the vulnerability described in GLSA-200502-05 (Newspost: Buffer overflow vulnerability) Niels Heinen has discovered a buffer overflow in the socket_getline() function of Newspost, which can be triggered by providing long strings that do not end with a newline character. Impact : A remote attacker could setup a malicious NNTP server and entice a Newspost user to post to it, leading to the crash of the Newspost process and potentially the execution of arbitrary code with the rights of the Newspost user. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 16442 published 2005-02-14 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/16442 title GLSA-200502-05 : Newspost: Buffer overflow vulnerability code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200502-05. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(16442); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:42"); script_cve_id("CVE-2005-0101"); script_xref(name:"GLSA", value:"200502-05"); script_name(english:"GLSA-200502-05 : Newspost: Buffer overflow vulnerability"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200502-05 (Newspost: Buffer overflow vulnerability) Niels Heinen has discovered a buffer overflow in the socket_getline() function of Newspost, which can be triggered by providing long strings that do not end with a newline character. Impact : A remote attacker could setup a malicious NNTP server and entice a Newspost user to post to it, leading to the crash of the Newspost process and potentially the execution of arbitrary code with the rights of the Newspost user. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200502-05" ); script_set_attribute( attribute:"solution", value: "All Newspost users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-nntp/newspost-2.0-r1'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:newspost"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/02/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/14"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/02/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"net-nntp/newspost", unaffected:make_list("rge 2.0-r1", "ge 2.1.1-r1"), vulnerable:make_list("lt 2.1.1-r1"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Newspost"); }
References
- http://marc.info/?l=bugtraq&m=110746336728781&w=2
- http://marc.info/?l=bugtraq&m=110746336728781&w=2
- http://people.freebsd.org/~niels/issues/newspost-20050114.txt
- http://people.freebsd.org/~niels/issues/newspost-20050114.txt
- http://secunia.com/advisories/14092/
- http://secunia.com/advisories/14092/
- http://secunia.com/advisories/14098
- http://secunia.com/advisories/14098
- http://security.gentoo.org/glsa/glsa-200502-05.xml
- http://security.gentoo.org/glsa/glsa-200502-05.xml
- http://securitytracker.com/id?1013056
- http://securitytracker.com/id?1013056
- http://www.securityfocus.com/bid/12418
- http://www.securityfocus.com/bid/12418
- http://www.vuxml.org/freebsd/7f13607b-6948-11d9-8937-00065be4b5b6.html
- http://www.vuxml.org/freebsd/7f13607b-6948-11d9-8937-00065be4b5b6.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19178
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19178