Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long “+VIEWS:” reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | gopher | < 3.0.11 | gopher_3.0.11_all.deb |
Debian | 11 | all | gopher | < 3.0.11 | gopher_3.0.11_all.deb |
Debian | 10 | all | gopher | < 3.0.11 | gopher_3.0.11_all.deb |
Debian | 999 | all | gopher | < 3.0.11 | gopher_3.0.11_all.deb |
Debian | 13 | all | gopher | < 3.0.11 | gopher_3.0.11_all.deb |