5
CVSSv2

CVE-2009-1959

Published: 08/06/2009 Updated: 17/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.

Vulnerable Product Search on Vulmon Subscribe to Product

irssi irssi 0.8.13

Vendor Advisories

It was discovered that irssi did not properly check the length of strings when processing WALLOPS messages If a user connected to an IRC network where an attacker had IRC operator privileges, a remote attacker could cause a denial of service ...
Debian Bug report logs - #531357 irssi WALLOPS heap off-by-one Package: irssi; Maintainer for irssi is Rhonda D'Vine <rhonda@debianorg>; Source for irssi is src:irssi (PTS, buildd, popcon) Reported by: Craig <craig@haquarterde> Date: Sun, 31 May 2009 21:42:02 UTC Severity: important Tags: security Merged with 5326 ...

Exploits

source: wwwsecurityfocuscom/bid/35399/info Irssi is prone to an off-by-one, heap-based, memory-corruption vulnerability because it fails to properly bounds-check user-supplied data before copying it into a memory buffer Attackers can exploit this issue to crash the vulnerable client, resulting in a denial-of-service condition Given the ...