5 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick. Se detectó un problema en WeeChat versiones anteriores a 2.7.1 (versiones 0.3.4 hasta 2.7 están afectadas). Cuando se recibe un nuevo mensaje 005 IRC con prefijos nick más largos, un desbordamiento del búfer y posiblemente un bloqueo puede presentarse cuando se ajusta un nuevo modo para un nick. • https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html https://security.gentoo.org/glsa/202003-51 https://weechat.org/doc/security • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

logger.c in the logger plugin in WeeChat before 1.9.1 allows a crash via strftime date/time specifiers, because a buffer is not initialized. logger.c en el plugin logger en WeeChat en versiones anteriores a la 1.9.1 permite un cierre inesperado mediante especificadores strftime de fecha y hora debido a que no se inicializa un buffer. • http://www.securityfocus.com/bid/101003 https://github.com/weechat/weechat/commit/f105c6f0b56fb5687b2d2aedf37cb1d1b434d556 https://weechat.org/download/security https://weechat.org/news/98/20170923-Version-1.9.1-security-release • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow. WeeChat en versiones anteriores a 1.7.1 permite una caída remota a través del envio de un nombre de archivo a través de DCC al plugin IRC. Esto ocurre en la función irc_ctcp_dcc_filename_without_quotes durante la eliminación de cotizaciones, con un desbordamiento de búfer. • http://www.debian.org/security/2017/dsa-3836 http://www.securityfocus.com/bid/97987 https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH https:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion." La función hook_process en el complemento API para WeeChat v0.3.0 hasta v0.3.9.1 permite a atacantes remotos ejecutar comandos de su elección a través de a través de metacaracteres de shell en un comando de un complemento, relacionado con "shell expansion". • http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html http://secunia.com • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 11%CPEs: 4EXPL: 0

Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded. Desbordamiento de búfer basado en memoria dinámica en weechat v0.3.6 a hasta v0.3.9 permite a atacantes remotos provocar una denegación de servicio (caída o bloqueo) y posiblemente ejecutar código arbitrario a través de colores IRC hechos a mano que no están debidamente decodificados. • http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092228.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092490.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092536.html http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html http://osvdb.org/87279 http://secunia.com/advisories/51377 http://weechat.org/security http://www.mandriva.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •