9.8
CVSSv3

CVE-2020-8955

Published: 12/02/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat up to and including 2.7 allows remote malicious users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

weechat weechat

fedoraproject fedora 30

fedoraproject fedora 31

fedoraproject fedora 32

opensuse leap 15.1

opensuse backports sle 15.0

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #951289 weechat: CVE-2020-8955 Package: src:weechat; Maintainer for src:weechat is Emmanuel Bouthenot <kolter@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 13 Feb 2020 21:42:01 UTC Severity: important Tags: security, upstream Found in version weechat/26-2 ...
A heap-based out-of-bounds write has been found in the IRC plugin of weechat before 271, in irc-modec, when receiving a malformed IRC message 324 (channel mode) ...