Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read.
References
Configurations
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940 - | |
References | () http://osvdb.org/52763 - | |
References | () http://savannah.nongnu.org/bugs/index.php?25862 - | |
References | () http://secunia.com/advisories/34304 - Vendor Advisory | |
References | () http://secunia.com/advisories/34328 - Vendor Advisory | |
References | () http://weechat.flashtux.org/ - Vendor Advisory | |
References | () http://www.debian.org/security/2009/dsa-1744 - | |
References | () http://www.openwall.com/lists/oss-security/2009/03/17/8 - | |
References | () http://www.securityfocus.com/bid/34148 - Patch | |
References | () http://www.vupen.com/english/advisories/2009/0758 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/49295 - |
Information
Published : 2009-03-19 10:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0661
Mitre link : CVE-2009-0661
CVE.ORG link : CVE-2009-0661
JSON object : View
Products Affected
flashtux
- weechat
CWE
CWE-20
Improper Input Validation