Netwin WebNews Webnews.exe Remote Overflow

medium Nessus Plugin ID 11732

Language:

Synopsis

The remote web server contains a CGI script that suffers from a buffer overflow vulnerability.

Description

The remote host appears to be running WebNews, which offers web-based access to Usenet news.

Some versions of WebNews are prone to a buffer overflow when processing a query string with an overly-long group parameter. An attacker may be able to leverage this issue to execute arbitrary shell code on the remote host subject to the permissions of the web server user id.

Solution

Apply the patch made released by the vendor on February 14th, 2002 if running Webnews 1.1 or older.

See Also

https://seclists.org/bugtraq/2002/Feb/250

Plugin Details

Severity: Medium

ID: 11732

File Name: webnews.nasl

Version: 1.24

Type: remote

Family: CGI abuses

Published: 6/11/2003

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/9/2004

Reference Information

CVE: CVE-2002-0290

BID: 4124