CVE-2007-6062
https://notcve.org/view.php?id=CVE-2007-6062
irc-channel.c in ngIRCd before 0.10.3 allows remote attackers to cause a denial of service (crash) via a JOIN command without a channel argument. El archivo irc-channel.c en ngIRCd versiones anteriores a 0.10.3, permite a atacantes remotos causar una denegación de servicio (bloqueo) por medio de un comando JOIN sin un argumento de canal. • http://arthur.barton.de/pipermail/ngircd-ml/2007-July/000292.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451875 http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10%3Bfilename=90-remote-vulnerability.dpatch%3Batt=1%3Bbug=451875 http://ngircd.barton.de/doc/ChangeLog http://osvdb.org/39295 http://secunia.com/advisories/27692 http://www.securityfocus.com/bid/26489 • CWE-20: Improper Input Validation •
CVE-2005-0199 – ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-0199
Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/25070 http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html http://bugs.gentoo.org/show_bug.cgi?id=79705 http://secunia.com/advisories/14056 http://secunia.com/advisories/14059 http://securitytracker.com/id?1013047 http://www.gentoo.org/security/en/glsa/glsa-200501-40.xml http://www.securityfocus.com/bid/12397 https://exchange.xforce.ibmcloud.com/vulnerabilities/19143 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2005-0226 – ngIRCd 0.8.2 - Remote Format String
https://notcve.org/view.php?id=CVE-2005-0226
Format string vulnerability in the Log_Resolver function in log.c for ngIRCd 0.8.2 and earlier, when compiled with IDENT, logging to SYSLOG, and with DEBUG enabled, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/784 http://marc.info/?l=bugtraq&m=110746413108183&w=2 http://secunia.com/advisories/14114 http://www.nosystem.com.ar/advisories/advisory-11.txt http://www.securityfocus.com/bid/12434 •