CVE-2020-8955Classic Buffer Overflow in Weechat

Severity
9.8CRITICALNVD
OSV7.5
EPSS
14.2%
top 5.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 12
Latest updateMay 24

Description

irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Debianweechat/weechat< 2.7.1-1+3
Ubuntuweechat/weechat< 1.4-2ubuntu0.1+esm1+2
NVDweechat/weechat0.3.82.7
NVDopensuse/leap15.1

Also affects: Debian Linux 8.0, 9.0, Fedora 30, 31, 32

Patches

🔴Vulnerability Details

4
GHSA
GHSA-j94p-wg5x-c7xg: irc_mode_channel_update in plugins/irc/irc-mode2022-05-24
OSV
weechat vulnerabilities2022-02-04
OSV
CVE-2020-8955: irc_mode_channel_update in plugins/irc/irc-mode2020-02-12
CVEList
CVE-2020-8955: irc_mode_channel_update in plugins/irc/irc-mode2020-02-12

📋Vendor Advisories

2
Ubuntu
WeeChat vulnerabilities2022-02-04
Debian
CVE-2020-8955: weechat - irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows ...2020

💬Community

3
Bugzilla
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c2020-02-14
Bugzilla
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c [fedora-all]2020-02-14
Bugzilla
CVE-2020-8955 weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c [epel-all]2020-02-14
CVE-2020-8955 — Classic Buffer Overflow in Weechat | cvebase