5
CVSSv2

CVE-2009-1959

Published: 08/06/2009 Updated: 17/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.

Vulnerable Product Search on Vulmon Subscribe to Product

irssi irssi 0.8.13

Vendor Advisories

Debian Bug report logs - #531357 irssi WALLOPS heap off-by-one Package: irssi; Maintainer for irssi is Rhonda D'Vine <rhonda@debianorg>; Source for irssi is src:irssi (PTS, buildd, popcon) Reported by: Craig <craig@haquarterde> Date: Sun, 31 May 2009 21:42:02 UTC Severity: important Tags: security Merged with 5326 ...
It was discovered that irssi did not properly check the length of strings when processing WALLOPS messages If a user connected to an IRC network where an attacker had IRC operator privileges, a remote attacker could cause a denial of service ...

Exploits

source: wwwsecurityfocuscom/bid/35399/info Irssi is prone to an off-by-one, heap-based, memory-corruption vulnerability because it fails to properly bounds-check user-supplied data before copying it into a memory buffer Attackers can exploit this issue to crash the vulnerable client, resulting in a denial-of-service condition Given the ...