Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-5129
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-30 Aug, 2012 | 22:55
Updated At-11 Apr, 2025 | 00:51

Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

xchat
xchat
>>xchat>>Versions up to 2.8.9(inclusive)
cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.2.1
cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.3.9
cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.3.10
cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.3.11
cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.3.12
cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.3.13
cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.4
cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.4.1
cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.4.2
cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.4.3
cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.5.6
cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.0
cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.1
cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.2
cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.3
cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.4
cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.5
cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.6
cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.7
cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.8
cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.8.9
cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.0
cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.1
cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.2
cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.3
cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.4
cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.5
cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.6
cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.7
cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.8
cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>1.9.9
cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.0
cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.1
cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.2
cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.3
cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.4
cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.5
cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.6
cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.7
cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.0.8
cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.6.7
cpe:2.3:a:xchat:xchat:2.6.7:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.0
cpe:2.3:a:xchat:xchat:2.8.0:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.1
cpe:2.3:a:xchat:xchat:2.8.1:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.3
cpe:2.3:a:xchat:xchat:2.8.3:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.3
cpe:2.3:a:xchat:xchat:2.8.3:c:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.3
cpe:2.3:a:xchat:xchat:2.8.3:e:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.4
cpe:2.3:a:xchat:xchat:2.8.4:*:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.5
cpe:2.3:a:xchat:xchat:2.8.5:b:*:*:*:*:*:*
xchat
xchat
>>xchat>>2.8.5
cpe:2.3:a:xchat:xchat:2.8.5:e:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.org/files/107312/xchat-dos.txtcve@mitre.org
Exploit
http://www.exploit-db.com/exploits/18159cve@mitre.org
Exploit
http://www.osvdb.org/77629cve@mitre.org
N/A
http://www.securityfocus.com/bid/50820cve@mitre.org
Exploit
http://www.securitytracker.com/id?1027468cve@mitre.org
N/A
http://packetstormsecurity.org/files/107312/xchat-dos.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.exploit-db.com/exploits/18159af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/77629af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/50820af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securitytracker.com/id?1027468af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found