oss-sec mailing list archives
CVE Request: inspircd
From: Micah Anderson <micah () riseup net>
Date: Tue, 22 Apr 2008 16:57:04 -0400
Versions prior to 1.1.17 of InspIRCd are vulnerable to a remotely triggerable buffer overflow which can lead to a Denial of Service (daemon crash) when the namesx and uhnames modules are loaded. InspIRCd is a modular C++ IRCd (IRC daemon) for Linux, BSD, Windows and Apple OS X systems created to provide a stable, modern, and lightweight IRCd written from scratch. Reference: http://inspircd.org/forum/showthread.php?t=2945 How the issue can be triggered: if you load both the namesx and uhnames modules, then set your nicklen to 31 characters and your ident len is 12 and and your channel len is 64, then you can crash the ircd by joining a lot of users to a channel with 31 char nicks, 12 char idents and very long hostnames, and then joining a single final user to the channel who has uhnames workaround: unload uhnames or upgrade to 1.1.17
Current thread:
- CVE Request: inspircd Micah Anderson (Apr 22)
- Re: CVE Request: inspircd Steven M. Christey (Apr 23)
- Re: CVE Request: inspircd security curmudgeon (Apr 23)
- Re: CVE Request: inspircd Micah Anderson (Apr 23)
- Re: CVE Request: inspircd Steven M. Christey (Apr 23)