ALT-PU-2020-3488-1
Closed vulnerabilities
BDU:2019-02520
Уязвимость IRC-клиента Irssi для операционных систем Debian GNU/Linux и Ubuntu, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-02521
Уязвимость IRC-клиента Irssi для операционной системы Ubuntu, связанная с использованием памяти после её освобождения при отправке SASL логина на сервер, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-03213
Уязвимость IRC-клиента Irssi операционных систем Ubuntu, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-10965
An issue was discovered in Irssi before 1.0.4. When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer.
Modified: 2024-11-21
CVE-2017-10966
An issue was discovered in Irssi before 1.0.4. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table.
Modified: 2024-11-21
CVE-2017-15227
Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15228
Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15721
In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15722
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15723
In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message.
Modified: 2024-11-21
CVE-2017-7191
The netjoin processing in Irssi 1.x before 1.0.2 allows attackers to cause a denial of service (use-after-free) and possibly execute arbitrary code via unspecified vectors.
Modified: 2024-11-21
CVE-2017-9468
In Irssi before 1.0.3, when receiving a DCC message without source nick/host, it attempts to dereference a NULL pointer. Thus, remote IRC servers can cause a crash.
Modified: 2024-11-21
CVE-2017-9469
In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory. Thus, remote attackers might be able to cause a crash.
Modified: 2024-11-21
CVE-2018-5205
When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.
Modified: 2024-11-21
CVE-2018-5206
When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.
Modified: 2024-11-21
CVE-2018-5207
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.
Modified: 2024-11-21
CVE-2018-5208
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.
Modified: 2024-11-21
CVE-2018-7050
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an "empty" nick.
Modified: 2024-11-21
CVE-2018-7051
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings.
- http://openwall.com/lists/oss-security/2018/02/15/1
- http://openwall.com/lists/oss-security/2018/02/15/1
- https://irssi.org/security/irssi_sa_2018_02.txt
- https://irssi.org/security/irssi_sa_2018_02.txt
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1318-1] irssi security update
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1318-1] irssi security update
- USN-3590-1
- USN-3590-1
- DSA-4162
- DSA-4162
Modified: 2024-11-21
CVE-2018-7052
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur.
Modified: 2024-11-21
CVE-2018-7053
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order.
Modified: 2024-11-21
CVE-2018-7054
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when a server is disconnected during netsplits. NOTE: this issue exists because of an incomplete fix for CVE-2017-7191.
Modified: 2024-11-21
CVE-2019-13045
Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server.
- openSUSE-SU-2019:1690
- openSUSE-SU-2019:1690
- openSUSE-SU-2019:1894
- openSUSE-SU-2019:1894
- http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html
- http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html
- [oss-security] 20190629 Irssi 1.2.1/1.1.3/1.0.8: CVE-2019-13045
- [oss-security] 20190629 Irssi 1.2.1/1.1.3/1.0.8: CVE-2019-13045
- 108998
- 108998
- https://github.com/irssi/irssi/commit/d23b0d22cc611e43c88d99192a59f413f951a955
- https://github.com/irssi/irssi/commit/d23b0d22cc611e43c88d99192a59f413f951a955
- https://irssi.org/security/irssi_sa_2019_06.txt
- https://irssi.org/security/irssi_sa_2019_06.txt
- 20190630 [slackware-security] irssi (SSA:2019-180-01)
- 20190630 [slackware-security] irssi (SSA:2019-180-01)
- USN-4046-1
- USN-4046-1
Modified: 2024-11-21
CVE-2019-15717
Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP.
- [oss-security] 20190829 Irssi 1.2.2:CVE-2019-15717
- [oss-security] 20190829 Irssi 1.2.2:CVE-2019-15717
- [oss-security] 20190829 Re: Irssi 1.2.2:CVE-2019-15717
- [oss-security] 20190829 Re: Irssi 1.2.2:CVE-2019-15717
- https://irssi.org/security/irssi_sa_2019_08.txt
- https://irssi.org/security/irssi_sa_2019_08.txt
- FEDORA-2019-d2257607b8
- FEDORA-2019-d2257607b8
- USN-4119-1
- USN-4119-1