Executive Summary
Summary | |
---|---|
Title | New BitchX packages fix DoS and arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-306 | First vendor Publication | 2003-05-19 |
Vendor | Debian | Last vendor Modification | 2003-05-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Timo Sirainen discovered several problems in BitchX, a popular client for Internet Relay Chat (IRC). A malicious server could craft special reply strings, triggering the client to write beyond buffer boundaries or allocate a negative amount of memory. This could lead to a denial of service if the client only crashes, but may also lead to executing of arbitrary code under the user id of the chatting user. For the stable distribution (woody) these problems have been fixed in version 1.0-0c19-1.1. For the old stable distribution (potato) these problems have been fixed in version 1.0-0c16-2.1. For the unstable distribution (sid) these problems have been fixed in version 1.0-0c19-8. We recommend that you upgrade your BitchX package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-306 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 306-1 (ircii-pana) File : nvt/deb_306_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 399-1 (epic4) File : nvt/deb_399_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
11826 | EPIC IRC Client Large Nickname CTCP Request Remote Overflow |
11058 | BitchX IRC Client Remote Integer Overflow DoS |
11057 | BitchX IRC Client Channel Name Remote Overflow |
11056 | BitchX IRC Client Nickname Remote Overflow |
11055 | BitchX IRC Client Long Hostname Remote Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-306.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-399.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:38 |
|