[ASA-202002-12] weechat: multiple issues
rgacogne at archlinux.org
Thu Mar 5 21:45:16 UTC 2020
Arch Linux Security Advisory ASA-202002-12
Date : 2020-02-25
CVE-ID : CVE-2020-8955 CVE-2020-9759 CVE-2020-9760
Package : weechat
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1103
The package weechat before version 2.7.1-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 2.7.1-1.
# pacman -Syu "weechat>=2.7.1-1"
The problems have been fixed upstream in version 2.7.1.
- CVE-2020-8955 (arbitrary code execution)
A heap-based out-of-bounds write has been found in the IRC plugin of
Weechat before 2.7.1, in irc-mode.c, when receiving a malformed IRC
message 324 (channel mode).
- CVE-2020-9759 (denial of service)
A heap-based out-of-bounds read has been found in Weechat before 2.7.1,
when receiving a malformed IRC message 352 (WHO). It could lead to a
off-by-one read resulting in denial of service (crash).
- CVE-2020-9760 (arbitrary code execution)
A heap-based out-of-bounds write has been found in Weechat before
2.7.1, when a new IRC message 005 is received with longer nick
prefixes. It could lead to writing out of the allocated prefixes array
when setting a prefix, resulting in denial of service (crash) or even
arbitrary code execution.
A remote attacker can crash the client and execute code remotely via a
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security