Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long +VIEWS: reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gopher | University_of_minnesota | 3.0.9 (including) | 3.0.9 (including) |
Gopher | Ubuntu | dapper | * |
Gopher | Ubuntu | devel | * |
Gopher | Ubuntu | edgy | * |
Gopher | Ubuntu | feisty | * |