Executive Summary

Summary
Title WeeChat: Denial of Service
Informations
Name GLSA-200904-04 First vendor Publication 2009-04-04
Vendor Gentoo Last vendor Modification 2009-04-04
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A processing error in WeeChat might lead to a Denial of Service.

Background

Wee Enhanced Environment for Chat (WeeChat) is a light and extensible console IRC client.

Description

Sebastien Helleu reported an array out-of-bounds error in the colored message handling.

Impact

A remote attacker could send a specially crafted PRIVMSG command, possibly leading to a Denial of Service (application crash).

Workaround

There is no known workaround at this time.

Resolution

All WeeChat users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-irc/weechat-0.2.6.1"

References

[ 1 ] CVE-2009-0661 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0661

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200904-04.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-200904-04.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12795
 
Oval ID: oval:org.mitre.oval:def:12795
Title: DSA-1744-1 weechat -- missing input sanitisation
Description: Sebastien Helleu discovered that an error in the handling of color codes in the weechat IRC client could cause an out-of-bounds read of an internal color array. This can be used by an attacker to crash user clients via a crafted PRIVMSG command. The weechat version in the oldstable distribution is not affected by this problem. For the stable distribution, this problem has been fixed in version 0.2.6-1+lenny1. For the testing distribution, this problem will be fixed soon. For the unstable distribution, this problem has been fixed in version 0.2.6.1-1. We recommend that you upgrade your weechat packages.
Family: unix Class: patch
Reference(s): DSA-1744-1
CVE-2009-0661
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): weechat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7773
 
Oval ID: oval:org.mitre.oval:def:7773
Title: DSA-1744 weechat -- missing input sanitisation
Description: Sebastien Helleu discovered that an error in the handling of color codes in the weechat IRC client could cause an out-of-bounds read of an internal color array. This can be used by an attacker to crash user clients via a crafted PRIVMSG command. The weechat version in the oldstable distribution (etch) is not affected by this problem.
Family: unix Class: patch
Reference(s): DSA-1744
CVE-2009-0661
Version: 3
Platform(s): Debian GNU/Linux 5.0
Product(s): weechat
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2009-04-06 Name : Gentoo Security Advisory GLSA 200904-04 (weechat)
File : nvt/glsa_200904_04.nasl
2009-03-31 Name : Fedora Core 10 FEDORA-2009-2859 (weechat)
File : nvt/fcore_2009_2859.nasl
2009-03-31 Name : Fedora Core 9 FEDORA-2009-2861 (weechat)
File : nvt/fcore_2009_2861.nasl
2009-03-20 Name : Debian Security Advisory DSA 1744-1 (weechat)
File : nvt/deb_1744_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
52763 WeeChat IRC Color Code Message Handling DoS

Nessus® Vulnerability Scanner

Date Description
2009-04-23 Name : The remote Fedora host is missing a security update.
File : fedora_2009-2859.nasl - Type : ACT_GATHER_INFO
2009-04-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200904-04.nasl - Type : ACT_GATHER_INFO
2009-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2009-2861.nasl - Type : ACT_GATHER_INFO
2009-03-19 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1744.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:36:28
  • Multiple Updates