WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://weechat.org/doc/security/ | patch vendor advisory |
https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html | third party advisory mailing list |