CVE-2017-8073Improper Restriction of Operations within the Bounds of a Memory Buffer in Weechat

Severity
7.5HIGHNVD
EPSS
1.6%
top 17.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 23
Latest updateMay 13

Description

WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/weechat< weechat 1.7-3 (bookworm)
NVDweechat/weechat< 1.7.1
Debianweechat/weechat< 1.7-3+3

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-67v2-2xg7-wff8: WeeChat before 12022-05-13
OSV
CVE-2017-8073: WeeChat before 12017-04-23

📋Vendor Advisories

1
Debian
CVE-2017-8073: weechat - WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the ...2017

💬Community

3
Bugzilla
CVE-2017-8073 weechat: Buffer overflow in the irc_ctcp_dcc_filename_without_quotes function [epel-all]2017-04-24
Bugzilla
CVE-2017-8073 weechat: Buffer overflow in the irc_ctcp_dcc_filename_without_quotes function2017-04-24
Bugzilla
CVE-2017-8073 weechat: Buffer overflow in the irc_ctcp_dcc_filename_without_quotes function [fedora-all]2017-04-24