CVE-2017-8073
https://notcve.org/view.php?id=CVE-2017-8073
WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow. WeeChat en versiones anteriores a 1.7.1 permite una caída remota a través del envio de un nombre de archivo a través de DCC al plugin IRC. Esto ocurre en la función irc_ctcp_dcc_filename_without_quotes durante la eliminación de cotizaciones, con un desbordamiento de búfer. • http://www.debian.org/security/2017/dsa-3836 http://www.securityfocus.com/bid/97987 https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH https:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-1428
https://notcve.org/view.php?id=CVE-2011-1428
Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API. Wee Enhanced Environment para Chat (también conocido como WeeChat) v0.3.4 y anteriores no comprueban de forma correcta que el nombre del servidor coincide con el nombre de dominio del campo subject de un certificado X.509, que permite a los atacantes "man-in-the-middle" falsificar un servidor de chat SSL a través de un certificado de su elección, relacionado con el uso incorrecto de la API GnuTLS. • http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commit%3Bh=c265cad1c95b84abfd4e8d861f25926ef13b5d91 http://savannah.nongnu.org/patch/index.php?7459 http://secunia.com/advisories/43543 http://www.securityfocus.com/bid/46612 • CWE-20: Improper Input Validation •
CVE-2009-0661
https://notcve.org/view.php?id=CVE-2009-0661
Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read. Wee Enhanced Environment for Chat (WeeChat) versión 0.2.6, permite a los atacantes remotos causar una denegación de servicio (bloqueo) por medio de un comando PRIVMSG IRC que contiene códigos de color diseñados que desencadenan una lectura fuera de límites. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940 http://osvdb.org/52763 http://savannah.nongnu.org/bugs/index.php?25862 http://secunia.com/advisories/34304 http://secunia.com/advisories/34328 http://weechat.flashtux.org http://www.debian.org/security/2009/dsa-1744 http://www.openwall.com/lists/oss-security/2009/03/17/8 http://www.securityfocus.com/bid/34148 http://www.vupen.com/english/advisories/2009/0758 https://exchange.xforce.ibmcloud.com/vulnerabilities • CWE-20: Improper Input Validation •