CVE-2020-9760 — Classic Buffer Overflow in Weechat
Severity
9.8CRITICALNVD
OSV7.5
EPSS
1.1%
top 22.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMay 24
Description
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages4 packages
Also affects: Debian Linux 8.0, 9.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
2💬Community
4Bugzilla▶
CVE-2020-9760 weechat: receiving IRC message 005 with longer nick prefixes could result in buffer overflow and crash↗2020-03-26
Bugzilla▶
CVE-2020-9760 weechat: receiving IRC message 005 with longer nick prefixes could result in buffer overflow and crash [epel-6]↗2020-03-26
Bugzilla▶
CVE-2020-9760 weechat: receiving IRC message 005 with longer nick prefixes could result in buffer overflow and crash [epel-7]↗2020-03-26
Bugzilla▶
CVE-2020-9760 weechat: receiving IRC message 005 with longer nick prefixes could result in buffer overflow and crash [fedora-all]↗2020-03-26