irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html - Mailing List, Third Party Advisory | |
References | () https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/ - | |
References | () https://security.gentoo.org/glsa/202003-51 - Third Party Advisory | |
References | () https://weechat.org/doc/security/ - Vendor Advisory |
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-02-12 22:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8955
Mitre link : CVE-2020-8955
CVE.ORG link : CVE-2020-8955
JSON object : View
Products Affected
fedoraproject
- fedora
opensuse
- backports_sle
- leap
debian
- debian_linux
weechat
- weechat
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')