Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://savannah.nongnu.org/bugs/index.php?25862 | |
http://www.securityfocus.com/bid/34148 | vdb entry patch |
http://secunia.com/advisories/34304 | third party advisory vendor advisory |
http://weechat.flashtux.org/ | vendor advisory |
http://osvdb.org/52763 | vdb entry |
http://www.vupen.com/english/advisories/2009/0758 | vdb entry patch vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940 | |
http://www.debian.org/security/2009/dsa-1744 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49295 | vdb entry |
http://secunia.com/advisories/34328 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2009/03/17/8 | mailing list |