Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2233

Опубликовано: 18 янв. 2017
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hexchatfixed2.12.0-1package
hexchatno-dsajessiepackage

Примечания

  • https://www.exploit-db.com/exploits/39657/

  • https://github.com/hexchat/hexchat/issues/1934

  • https://github.com/hexchat/hexchat/commit/4e061a43b3453a9856d34250c3913175c45afe9d

EPSS

Процентиль: 92%
0.09005
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.

CVSS3: 7.5
nvd
около 9 лет назад

Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.

CVSS3: 7.5
github
больше 3 лет назад

Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.

EPSS

Процентиль: 92%
0.09005
Низкий