CVE-2020-8955 — Classic Buffer Overflow in Weechat
Severity
9.8CRITICALNVD
OSV7.5
EPSS
14.2%
top 5.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 12
Latest updateMay 24
Description
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 8.0, 9.0, Fedora 30, 31, 32
Patches
🔴Vulnerability Details
4📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c↗2020-02-14
Bugzilla▶
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c [fedora-all]↗2020-02-14
Bugzilla▶
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c [epel-all]↗2020-02-14