7.5
CVSSv2

CVE-2017-10966

Published: 07/07/2017 Updated: 05/11/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in Irssi prior to 1.0.4. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

irssi irssi

Vendor Advisories

Several security issues were fixed in Irssi ...
Debian Bug report logs - #867598 irssi: CVE-2017-10965 CVE-2017-10966 Package: src:irssi; Maintainer for src:irssi is Rhonda D'Vine <rhonda@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 7 Jul 2017 17:15:02 UTC Severity: important Tags: fixed-upstream, patch, security, upstream Found ...
Debian Bug report logs - #879521 irssi: multiple vulnerabilities fixed in irssi 105 Package: src:irssi; Maintainer for src:irssi is Rhonda D'Vine <rhonda@debianorg>; Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Sun, 22 Oct 2017 15:27:02 UTC Severity: grave Tags: fixed-upstream, security, upstream Foun ...
Multiple vulnerabilities have been discovered in Irssi, a terminal based IRC client The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-10965 Brian geeknik Carpenter of Geeknik Labs discovered that Irssi does not properly handle receiving messages with invalid time stamps A malicious IRC serve ...
An issue was discovered in Irssi before 104 While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it This would then result in use-after-free conditions on each access of the hash table ...
While updating the internal nick list, Irssi may incorrectly use the GHashTable interface and free the nick while updating it This will then result in use-after-free conditions on each access of the hash table Note that this should not happen with a conforming IRC server, so it requires control over the IRC server or a position of man-in-the-midd ...