WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
References
Link | Resource |
---|---|
https://weechat.org/doc/security/ | Patch Vendor Advisory |
https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html | Mailing List Third Party Advisory |
Information
Published : 2021-09-05 11:15
Updated : 2021-10-07 10:55
NVD link : CVE-2021-40516
Mitre link : CVE-2021-40516
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
weechat
- weechat