Filtered by vendor Irssi
Subscribe
Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-29602 | 1 Irssi | 1 Docker Image | 2020-12-09 | 10.0 HIGH | 9.8 CRITICAL |
The official irssi docker images before 1.1-alpine (Alpine specific) contain a blank password for a root user. System using the irssi docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password. | |||||
CVE-2019-15717 | 2 Canonical, Irssi | 2 Ubuntu Linux, Irssi | 2019-09-14 | 7.5 HIGH | 9.8 CRITICAL |
Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP. | |||||
CVE-2018-7054 | 3 Canonical, Debian, Irssi | 3 Ubuntu Linux, Debian Linux, Irssi | 2019-07-04 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when a server is disconnected during netsplits. NOTE: this issue exists because of an incomplete fix for CVE-2017-7191. | |||||
CVE-2019-13045 | 1 Irssi | 1 Irssi | 2019-07-03 | 6.8 MEDIUM | 8.1 HIGH |
Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server. | |||||
CVE-2017-5196 | 1 Irssi | 1 Irssi | 2019-03-18 | 5.0 MEDIUM | 7.5 HIGH |
Irssi 0.8.18 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via vectors involving strings that are not UTF8. | |||||
CVE-2017-5195 | 1 Irssi | 1 Irssi | 2019-03-18 | 5.0 MEDIUM | 7.5 HIGH |
Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ANSI x8 color code. | |||||
CVE-2017-5194 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-18 | 5.0 MEDIUM | 7.5 HIGH |
Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message. | |||||
CVE-2017-5193 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-18 | 5.0 MEDIUM | 7.5 HIGH |
The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick. | |||||
CVE-2017-5356 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-15 | 5.0 MEDIUM | 7.5 HIGH |
Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]). | |||||
CVE-2017-9469 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-14 | 5.0 MEDIUM | 7.5 HIGH |
In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory. Thus, remote attackers might be able to cause a crash. | |||||
CVE-2017-9468 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-14 | 5.0 MEDIUM | 7.5 HIGH |
In Irssi before 1.0.3, when receiving a DCC message without source nick/host, it attempts to dereference a NULL pointer. Thus, remote IRC servers can cause a crash. | |||||
CVE-2017-15722 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-14 | 4.3 MEDIUM | 5.9 MEDIUM |
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string. | |||||
CVE-2017-15723 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-14 | 5.0 MEDIUM | 7.5 HIGH |
In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message. | |||||
CVE-2017-15721 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-14 | 5.0 MEDIUM | 7.5 HIGH |
In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468. | |||||
CVE-2018-5206 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-12 | 7.5 HIGH | 9.8 CRITICAL |
When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer. | |||||
CVE-2018-5208 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-12 | 7.5 HIGH | 9.8 CRITICAL |
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings. | |||||
CVE-2018-5207 | 2 Debian, Irssi | 2 Debian Linux, Irssi | 2019-03-12 | 5.0 MEDIUM | 7.5 HIGH |
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string. | |||||
CVE-2018-5205 | 3 Canonical, Debian, Irssi | 3 Ubuntu Linux, Debian Linux, Irssi | 2019-03-12 | 5.0 MEDIUM | 7.5 HIGH |
When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string. | |||||
CVE-2018-7051 | 3 Canonical, Debian, Irssi | 3 Ubuntu Linux, Debian Linux, Irssi | 2019-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings. | |||||
CVE-2018-7050 | 3 Canonical, Debian, Irssi | 3 Ubuntu Linux, Debian Linux, Irssi | 2019-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an "empty" nick. |