Overview
The University of Minnesota Gopher client may be vulnerable to a buffer overflow when handling overly long "+VIEWS:" reply messages sent from a malicious server.
Description
The UMN Gopher suite includes a Gopher client for navigating Gopherspace. However, the Gopher client may incorrectly handle a reply message from the server with overly long "+VIEWS:" content. The VIfromLine() function contains a boundary error when copying input to a buffer on the stack, which may cause a stack-based buffer overflow condition. Successful exploitation may allow remote arbitrary code execution. If the user is running the gopher client with elevated privileges, the system may be compromised to the point of the attacking taking total control. |
Impact
A remote unauthenticated attacker may be able to execute arbitrary code on the remote system by convincing the user to follow a gopher link. |
Solution
Disable Gopher support |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to vade79 for reporting this vulnerability.
This document was written by Ken MacInnis.
Other Information
CVE IDs: | None |
Severity Metric: | 1.27 |
Date Public: | 2005-08-30 |
Date First Published: | 2005-09-02 |
Date Last Updated: | 2005-09-02 16:27 UTC |
Document Revision: | 7 |