Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 132011 - net-irc/cgiirc: Buffer Overflow in client.c
Summary: net-irc/cgiirc: Buffer Overflow in client.c
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major
Assignee: Gentoo Security
URL: http://secunia.com/advisories/19922/
Whiteboard: B1 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-05-02 05:32 UTC by Raphael Marichez (Falco) (RETIRED)
Modified: 2006-05-02 07:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-05-02 05:32:10 UTC
No GLSA for this, since there is no stable ebuild.

Version 0.5.8 corrects this vuln.


--------------------------------------------------

Secunia Advisory:	SA19922	Print Advisory  
Release Date:	2006-05-02

Description:
A vulnerability has been reported in CGI:IRC, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

The vulnerability is caused due to an error in client.c within the handling of the received cookie value. This can be exploited to cause a buffer overflow and may allow arbitrary code execution.

The vulnerability has been reported in version 0.5.7. Prior versions may also be affected.

Solution:
Update to version 0.5.8.
http://cgiirc.sourceforge.net/download/

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://cvs.cgiirc.org/chngview?cn=263
http://cvs.cgiirc.org/chngview?cn=283
Comment 1 Renat Lumpau (RETIRED) gentoo-dev 2006-05-02 06:28:25 UTC
one step ahead of you guys - already in CVS :)
Comment 2 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-05-02 07:45:52 UTC
Good ! 
I was a few hours late :/  I have synced this morning but it wasn't up to date.