Executive Summary
Summary | |
---|---|
Title | New EPIC packages fix DoS and arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-287 | First vendor Publication | 2003-04-15 |
Vendor | Debian | Last vendor Modification | 2003-04-15 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Timo Sirainen discovered several problems in EPIC, a popular client for Internet Relay Chat (IRC). A malicious server could craft special reply strings, triggering the client to write beyond buffer boundaries. This could lead to a denial of service if the client only crashes, but may also lead to executing of arbitrary code under the user id of the chatting user. For the stable distribution (woody) these problems have been fixed in version 3.004-17.1. For the old stable distribution (potato) these problems have been fixed in version 3.004-16.1. For the unstable distribution (sid) these problems have been fixed in version 3.004-19. We recommend that you upgrade your EPIC package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-287 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 287-1 (epic) File : nvt/deb_287_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
11824 | EPIC IRC Client userhost_cmd_returned Function Remote Overflow |
11820 | EPIC IRC Client Statusbar Remote Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-287.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:34 |
|