CVE-2002-1788

Source
https://nvd.nist.gov/vuln/detail/CVE-2002-1788
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2002-1788.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2002-1788
Published
2002-12-31T05:00:00Z
Modified
2024-11-20T23:42:07Z
Summary
[none]
Details

Format string vulnerability in the nn_exitmsg function in nn 6.6.0 through 6.6.3 allows remote NNTP servers to execute arbitrary code via format strings in server responses.

References

Affected packages

Debian:11 / nn

Package

Name
nn
Purl
pkg:deb/debian/nn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / nn

Package

Name
nn
Purl
pkg:deb/debian/nn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nn

Package

Name
nn
Purl
pkg:deb/debian/nn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}