5
CVSSv2

CVE-2016-7045

Published: 27/09/2016 Updated: 30/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The format_send_to_gui function in the format parsing code in Irssi prior to 0.8.20 allows remote malicious users to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

irssi irssi

debian debian linux 8.0

canonical ubuntu linux 16.04

Vendor Advisories

Irssi could be made to crash if it received specially crafted network traffic ...
Gabriel Campana and Adrien Guinet from Quarkslab discovered two remotely exploitable crash and heap corruption vulnerabilities in the format parsing code in Irssi, a terminal based IRC client For the stable distribution (jessie), these problems have been fixed in version 0817-1+deb8u1 We recommend that you upgrade your irssi packages ...
The format_send_to_gui function in the format parsing code in Irssi before 0820 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string ...
The format_send_to_gui() function does not validate the length of the string before incrementing the `ptr' pointer in all cases If that happens, the pointer `ptr' can be incremented twice and thus end past the boundaries of the original `dup' buffer Remote code execution might be difficult since only Nuls are written ...