DSA-157-1 irssi-text -- denial of service

Related Vulnerabilities: CVE-2002-0983  

The IRC client irssi is vulnerable to a denial of service condition. The problem occurs when a user attempts to join a channel that has an overly long topic description. When a certain string is appended to the topic, irssi will crash. This problem has been fixed in version 0.8.4-3.1 for the current stable distribution (woody) and in version 0.8.5-2 for the unstable distribution (sid). The old stable distribution (potato) is not affected, since the corresponding portions of code are not present. The same applies to irssi-gnome and irssi-gtk, which don't seem to be affected as well. We recommend that you upgrade your irssi-text package.

Debian Security Advisory

DSA-157-1 irssi-text -- denial of service

Date Reported:
23 Aug 2002
Affected Packages:
irssi-text
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 5055.
In Mitre's CVE dictionary: CVE-2002-0983.
More information:

The IRC client irssi is vulnerable to a denial of service condition. The problem occurs when a user attempts to join a channel that has an overly long topic description. When a certain string is appended to the topic, irssi will crash.

This problem has been fixed in version 0.8.4-3.1 for the current stable distribution (woody) and in version 0.8.5-2 for the unstable distribution (sid). The old stable distribution (potato) is not affected, since the corresponding portions of code are not present. The same applies to irssi-gnome and irssi-gtk, which don't seem to be affected as well.

We recommend that you upgrade your irssi-text package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.dsc
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.diff.gz
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_ia64.deb
HP Precision:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.