3 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function. La implementación del protocolo Server-Server en ngIRCd versiones anteriores a 26~rc2, permite un acceso fuera de límites, como es demostrado por la función IRC_NJOIN() • https://github.com/ngircd/ngircd/issues/274 https://github.com/ngircd/ngircd/issues/277 https://github.com/ngircd/ngircd/pull/275 https://github.com/ngircd/ngircd/pull/276 https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2 https://lists.debian.org/debian-lts-announce/2020/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJOYV5GHUFJMUVQW3TJKXZ7JPXL4W3ER https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora • CWE-125: Out-of-bounds Read •

CVSS: 4.3EPSS: 2%CPEs: 6EXPL: 0

The (1) Conn_StartLogin and (2) cb_Read_Resolver_Result functions in conn.c in ngIRCd 18 through 20.2, when the configuration option NoticeAuth is enabled, does not properly handle the return code for the Handle_Write function, which allows remote attackers to cause a denial of service (assertion failure and server crash) via unspecified vectors, related to a "notice auth" message not being sent to a new client. Las funciones (1) Conn_StartLogin y (2) cb_Read_Resolver_Result en conn.c de ngIRCd 18 hasta 20.2, cuando la opción de configuración NoticeAuth es activada, no maneja apropiadamente el código de retorno para la función HandleWrite, lo que permite a atacantes remotos causar una denegación de servicio (fallo de aserción y caída del servidor) a través de vectores no especificados, relacionado con un mensaje "notice auth" que no es enviado al nuevo cliente. • http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git%3Ba=commit%3Bh=309122017ebc6fff039a7cab1b82f632853d82d5 http://arthur.barton.de/pipermail/ngircd-ml/2013-August/000645.html http://freecode.com/projects/ngircd/releases/357245 http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115047.html http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115077.html http://osvdb.org/96590 http://secunia.com/advisories/54567 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 2

Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/25070 http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html http://bugs.gentoo.org/show_bug.cgi?id=79705 http://secunia.com/advisories/14056 http://secunia.com/advisories/14059 http://securitytracker.com/id?1013047 http://www.gentoo.org/security/en/glsa/glsa-200501-40.xml http://www.securityfocus.com/bid/12397 https://exchange.xforce.ibmcloud.com/vulnerabilities/19143 • CWE-191: Integer Underflow (Wrap or Wraparound) •