Описание
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
Ссылки
- Mailing ListMitigationPatchThird Party Advisory
- MitigationPatchVendor Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Mailing ListMitigationPatchThird Party Advisory
- MitigationPatchVendor Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.4 (включая)
cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
EPSS
Процентиль: 77%
0.01082
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 5.9
ubuntu
больше 8 лет назад
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
CVSS3: 7.5
redhat
больше 8 лет назад
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
CVSS3: 5.9
debian
больше 8 лет назад
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe ch ...
CVSS3: 5.9
github
больше 3 лет назад
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
EPSS
Процентиль: 77%
0.01082
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125