The (1) Conn_StartLogin and (2) cb_Read_Resolver_Result functions in conn.c in ngIRCd 18 through 20.2, when the configuration option NoticeAuth is enabled, does not properly handle the return code for the Handle_Write function, which allows remote attackers to cause a denial of service (assertion failure and server crash) via unspecified vectors, related to a "notice auth" message not being sent to a new client.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://arthur.barton.de/pipermail/ngircd-ml/2013-August/000645.html | mailing list |
http://osvdb.org/96590 | vdb entry |
http://freecode.com/projects/ngircd/releases/357245 | patch |
http://secunia.com/advisories/54567 | third party advisory vendor advisory |
http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git%3Ba=commit%3Bh=309122017ebc6fff039a7cab1b82f632853d82d5 | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115047.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115077.html | vendor advisory |