ALT-PU-2020-1694-1
Closed vulnerabilities
Published: 2020-02-12
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-8955
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/
- https://security.gentoo.org/glsa/202003-51
- https://weechat.org/doc/security/
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/
- https://security.gentoo.org/glsa/202003-51
- https://weechat.org/doc/security/
Published: 2020-03-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-9760
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
- https://security.gentoo.org/glsa/202003-51
- https://weechat.org/doc/security/
- https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
- https://security.gentoo.org/glsa/202003-51
- https://weechat.org/doc/security/