RSS   Podatności dla 'INN'   RSS

2012-11-11
 
CVE-2012-3523

CWE-264
 

 
The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.

 
2004-02-03
 
CVE-2004-0045

 

 
Buffer overflow in the ARTpost function in art.c in the control message handling code for INN 2.4.0 may allow remote attackers to execute arbitrary code.

 
2002-08-12
 
CVE-2002-0525

 

 
Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.

 
2001-04-21
 
CVE-2001-1442

 

 
Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument.

 
2000-02-06
 
CVE-2000-0472

 

 
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.

 
2000-10-20
 
CVE-2000-0360

 

 
Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article.

 
1997-02-20
 
CVE-1999-0868

 

 
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.

 
1999-05-11
 
CVE-1999-0785

 

 
The INN inndstart program allows local users to gain root privileges via the "pathrun" parameter in the inn.conf file.

 
 
CVE-1999-0754

 

 
The INN inndstart program allows local users to gain privileges by specifying an alternate configuration file using the INNCONF environmental variable.

 
2000-04-27
 
CVE-1999-0706

 

 
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.

 


Copyright 2024, cxsecurity.com

 

Back to Top