Description
TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.
Published: 2026-03-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local code execution via stack buffer overflow
Action: Immediate Patch
AI Analysis

Impact

TRN 3.6‑23 suffers from a stack buffer overflow (CWE‑787) that allows an attacker to supply an oversized command‑line argument. The overflow is triggered with 156 bytes of padding followed by a crafted return address, which overwrites the instruction pointer and redirects the program to execute injected shellcode with the same privileges as the user launching TRN. This flaw enables arbitrary code execution at the local user level.

Affected Systems

The product affected is Threaded USENET News Reader version 3.6‑23. No other versions or products are currently listed as impacted.

Risk and Exploitability

The vulnerability has a CVSS score of 8.6, indicating high severity. No EPSS data is available and the issue is not listed in the CISA KEV catalog, suggesting no publicly documented exploits yet. The attack vector is local; an attacker needs to run TRN with a crafted argument. If local access is granted, a malicious user can trigger the overflow and execute arbitrary code under their own user privileges.

Generated by OpenCVE AI on March 28, 2026 at 13:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or support channels for an official patch or a newer version that resolves the overflow and install it immediately.
  • If no patch is currently available, limit the use of TRN to trusted users only and avoid passing oversized arguments that could trigger the overflow.
  • Consider running TRN inside a sandboxed or restricted environment to contain any potential exploitation.

Generated by OpenCVE AI on March 28, 2026 at 13:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.
Title TRN 3.6-23 Stack Buffer Overflow Local Code Execution
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-28T11:58:03.787Z

Reserved: 2026-03-28T11:34:09.816Z

Link: CVE-2016-20042

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T12:16:00.057

Modified: 2026-03-28T12:16:00.057

Link: CVE-2016-20042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:32:28Z

Weaknesses