TITLE: BNC IRC proxy "getnickuserhost()" Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA13149 VERIFY ADVISORY: http://secunia.com/advisories/13149/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: From remote SOFTWARE: BNC IRC proxy 2.x http://secunia.com/product/1622/ DESCRIPTION: Leon Juranic has reported a vulnerability in BNC IRC proxy, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused due to some boundary errors in the "getnickuserhost()" function in "cmds.c" when processing IRC server responses. This can be exploited by a malicious server to cause a buffer overflow. Successful exploitation crashes the process but may potentially also allow execution of arbitrary code. The vulnerability has been reported in version 2.8.9. Other versions may also be affected. SOLUTION: Update to version 2.9.0: http://www.gotbnc.com/files/bnc2.9.0.tar.gz PROVIDED AND/OR DISCOVERED BY: Leon Juranic ORIGINAL ADVISORY: http://security.lss.hr/en/index.php?page=details&ID=LSS-2004-11-03
Changelog: 2.9.1 1. SECURITY FIX: password check, was only letting incorrect passwords in 2. Fixed IP binding on listen 2.9.0 1. Added trailing newlines to log records 2. Added extra error handling on accepting connections 3. Fixed buffer overflow in getnickuserhost (reported by Leon Juranic) 4. Added extra check for gethostbyname2 5. Made password check more thorough 6. Fixed ipv6 dns resolving to random ipv4 === This advisory is about the buffer overflow fix in 2.9.0, but 2.9.1 also fixes another security issue. Vapier, please bump to 2.9.1.
2.9.1 is now in portage
archs, please mark stable.
Stable on sparc
stable on ppc
Stable on alpha.
GLSA drafted Security please review.
GLSA 200411-24