oss-sec mailing list archives

CVE Request: inspircd


From: Micah Anderson <micah () riseup net>
Date: Tue, 22 Apr 2008 16:57:04 -0400


Versions prior to 1.1.17 of InspIRCd are vulnerable to a remotely
triggerable buffer overflow which can lead to a Denial of Service
(daemon crash) when the namesx and uhnames modules are loaded. 

InspIRCd is a modular C++ IRCd (IRC daemon) for Linux, BSD, Windows and
Apple OS X systems created to provide a stable, modern, and lightweight
IRCd written from scratch.

Reference: http://inspircd.org/forum/showthread.php?t=2945

How the issue can be triggered:

if you load both the namesx and uhnames modules, then set your nicklen
to 31 characters and your ident len is 12 and and your channel len is
64, then you can crash the ircd by joining a lot of users to a channel
with 31 char nicks, 12 char idents and very long hostnames, and then
joining a single final user to the channel who has uhnames

workaround: unload uhnames or upgrade to 1.1.17



Current thread: