In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.debian.org/security/2017/dsa-4016 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html | third party advisory mailing list |
https://irssi.org/security/irssi_sa_2017_10.txt | patch vendor advisory mitigation |
http://openwall.com/lists/oss-security/2017/10/22/4 | patch mailing list mitigation third party advisory |