Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html | mailing list patch broken link |
http://securitytracker.com/id?1013047 | vdb entry third party advisory broken link |
http://secunia.com/advisories/14056 | third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19143 | vdb entry third party advisory |
http://www.gentoo.org/security/en/glsa/glsa-200501-40.xml | third party advisory patch vendor advisory |
http://secunia.com/advisories/14059 | third party advisory broken link |
http://bugs.gentoo.org/show_bug.cgi?id=79705 | issue tracking |
http://www.securityfocus.com/bid/12397 | patch exploit vdb entry third party advisory broken link |