Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/38382 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/38381 | third-party-advisory x_refsource_SECUNIA |
http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html | mailing-list x_refsource_MLIST |
http://www.debian.org/security/2010/dsa-1980 | vendor-advisory x_refsource_DEBIAN |
http://secunia.com/advisories/38383 | third-party-advisory x_refsource_SECUNIA |
http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/37978 | vdb-entry x_refsource_BID |
http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044&view=rev | x_refsource_CONFIRM |
http://secunia.com/advisories/38210 | third-party-advisory x_refsource_SECUNIA |
http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/38382 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/38381 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html | mailing-list x_refsource_MLIST x_transferred |
http://www.debian.org/security/2010/dsa-1980 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/38383 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/37978 | vdb-entry x_refsource_BID x_transferred |
http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044&view=rev | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/38210 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz | x_refsource_CONFIRM x_transferred |
Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.8 | MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |