7.5
CVSSv3

CVE-2017-8073

Published: 23/04/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

WeeChat prior to 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

weechat weechat

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #861121 weechat: CVE-2017-8073 Package: src:weechat; Maintainer for src:weechat is Emmanuel Bouthenot <kolter@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 24 Apr 2017 19:39:01 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Found in versio ...
It was discovered that weechat, a fast and light chat client, is prone to a buffer overflow vulnerability in the IRC plugin, allowing a remote attacker to cause a denial-of-service by sending a specially crafted filename via DCC For the stable distribution (jessie), this problem has been fixed in version 101-1+deb8u1 For the unstable distributi ...
WeeChat before 171 allows a remote crash by sending a filename via DCC to the IRC plugin This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, which results in a buffer overflow ...