Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/38382 | third party advisory vendor advisory |
http://secunia.com/advisories/38381 | third party advisory vendor advisory |
http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html | mailing list |
http://www.debian.org/security/2010/dsa-1980 | patch vendor advisory |
http://secunia.com/advisories/38383 | third party advisory vendor advisory |
http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES | |
http://www.securityfocus.com/bid/37978 | vdb entry |
http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044&view=rev | |
http://secunia.com/advisories/38210 | third party advisory vendor advisory |
http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz | patch |