UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

BID:1569

Info

UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

Bugtraq ID: 1569
Class: Boundary Condition Error
CVE:
Remote: Yes
Local: Yes
Published: Aug 10 2000 12:00AM
Updated: Aug 10 2000 12:00AM
Credit: Disclosed in an advisory by Guardent (A0208102000) on August 10, 2000.
Vulnerable: University of Minnesota gopherd 2.3.1
- Debian Linux 2.1
- Mandriva Linux Mandrake 7.1
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- SuSE Linux 7.0
University of Minnesota gopherd 2.3
- Debian Linux 2.1
- Mandriva Linux Mandrake 7.1
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- SuSE Linux 7.0
Not Vulnerable:

Discussion

UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

There is a buffer overflow vulnerability in gopherd 2.x versions (by University of Minnesota) which could result in a remote root compromise of a targetted host. The problem lies in the generation of a Gopher DES Key (GDESKey), done by gopherd when the server receives an instruction to decode a ticket of the form "* [username] [ticket]" from a client.

Exploit / POC

UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

This vulnerability is exploitable, according to the advisory released by Guardent. Exploit code has not been received.

Solution / Fix

UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

Solution:
The previous patch released by Guardent (gopherd2x.patch) patched the discussed vulnerability but introduced another buffer overflow condition. New patches are available.


University of Minnesota gopherd 2.3

University of Minnesota gopherd 2.3.1

References

UMN Gopherd 2.x Remote Root Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report