CVE-2021-40516

WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
Configurations

Configuration 1 (hide)

cpe:2.3:a:weechat:weechat:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:24

Type Values Removed Values Added
References () https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b - Patch, Third Party Advisory () https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html - Mailing List, Third Party Advisory
References () https://weechat.org/doc/security/ - Patch, Vendor Advisory () https://weechat.org/doc/security/ - Patch, Vendor Advisory

Information

Published : 2021-09-05 18:15

Updated : 2024-11-21 06:24


NVD link : CVE-2021-40516

Mitre link : CVE-2021-40516

CVE.ORG link : CVE-2021-40516


JSON object : View

Products Affected

debian

  • debian_linux

weechat

  • weechat
CWE
CWE-125

Out-of-bounds Read