WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
References
Link | Resource |
---|---|
https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html | Mailing List Third Party Advisory |
https://weechat.org/doc/security/ | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-09-05 18:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-40516
Mitre link : CVE-2021-40516
CVE.ORG link : CVE-2021-40516
JSON object : View
Products Affected
weechat
- weechat
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read