Debian Weechat vulnerabilities

12 known vulnerabilities affecting debian/weechat.

Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH5MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2024-46613CRITICALCVSS 9.8fixed in weechat 4.4.2-1 (forky)2024
CVE-2024-46613 [CRITICAL] CVE-2024-46613: weechat - WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at co... WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 4.4.2-1) sid: resolved (fixed
debian
CVE-2022-28352MEDIUMCVSS 4.3fixed in weechat 3.4.1-1 (bookworm)2022
CVE-2022-28352 [MEDIUM] CVE-2022-28352: weechat - WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not... WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.g
debian
CVE-2021-40516HIGHCVSS 7.5fixed in weechat 3.2.1-1 (bookworm)2021
CVE-2021-40516 [HIGH] CVE-2021-40516: weechat - WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash... WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin. Scope: local bookworm: resolved (fixed in 3.2.1-1) bullseye: resolved (fixed in 3.0-1+deb11u1) forky: resolved (fixed in 3.2.1-1) sid: resolved (fixed in 3.2.1-1) tr
debian
CVE-2020-8955CRITICALCVSS 9.8fixed in weechat 2.7.1-1 (bookworm)2020
CVE-2020-8955 [CRITICAL] CVE-2020-8955: weechat - irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows ... irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode). Scope: local bookworm: resolved (fixed in 2.7.1-1) bullseye: resolved (fixed in 2.7.1-1) forky: resolved (fixe
debian
CVE-2020-9760CRITICALCVSS 9.8fixed in weechat 2.7.1-1 (bookworm)2020
CVE-2020-9760 [CRITICAL] CVE-2020-9760: weechat - An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). Whe... An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick. Scope: local bookworm: resolved (fixed in 2.7.1-1) bullseye: resolved (fixed in 2.7.1-1) forky: resolved (fixed in 2.7.1-1) sid: resolved
debian
CVE-2020-9759MEDIUMCVSS 4.6fixed in weechat 2.7.1-1 (bookworm)2020
CVE-2020-9759 [MEDIUM] CVE-2020-9759: weechat - A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to e... A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files. Scope: local bookworm: resolved (fixed in 2.7.1-1) bullseye: resolved (fixed in 2
debian
CVE-2017-14727HIGHCVSS 7.5fixed in weechat 1.9.1-1 (bookworm)2017
CVE-2017-14727 [HIGH] CVE-2017-14727: weechat - logger.c in the logger plugin in WeeChat before 1.9.1 allows a crash via strftim... logger.c in the logger plugin in WeeChat before 1.9.1 allows a crash via strftime date/time specifiers, because a buffer is not initialized. Scope: local bookworm: resolved (fixed in 1.9.1-1) bullseye: resolved (fixed in 1.9.1-1) forky: resolved (fixed in 1.9.1-1) sid: resolved (fixed in 1.9.1-1) trixie: resolved (fixed in 1.9.1-1)
debian
CVE-2017-8073HIGHCVSS 7.5fixed in weechat 1.7-3 (bookworm)2017
CVE-2017-8073 [HIGH] CVE-2017-8073: weechat - WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the ... WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow. Scope: local bookworm: resolved (fixed in 1.7-3) bullseye: resolved (fixed in 1.7-3) forky: resolved (fixed in 1.7-3) sid: resolved (fixed in 1.7-3) trixie: resolved (
debian
CVE-2012-5854HIGHCVSS 7.5fixed in weechat 0.3.9.1-1 (bookworm)2012
CVE-2012-5854 [HIGH] CVE-2012-5854: weechat - Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attacker... Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded. Scope: local bookworm: resolved (fixed in 0.3.9.1-1) bullseye: resolved (fixed in 0.3.9.1-1) forky: resolved (fixed in 0.3.9.1-1) sid: resolved (fixed in
debian
CVE-2012-5534HIGHCVSS 7.5fixed in weechat 0.3.9.2-1 (bookworm)2012
CVE-2012-5534 [HIGH] CVE-2012-5534: weechat - The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 al... The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion." Scope: local bookworm: resolved (fixed in 0.3.9.2-1) bullseye: resolved (fixed in 0.3.9.2-1) forky: resolved (fixed in 0.3.9.2-1) sid: resolved (fixed in 0
debian
CVE-2011-1428MEDIUMCVSS 5.8fixed in weechat 0.3.5-1 (bookworm)2011
CVE-2011-1428 [MEDIUM] CVE-2011-1428: weechat - Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not prope... Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API. Scope: local bookworm: resolved (fixed in 0.3
debian
CVE-2009-0661MEDIUMCVSS 5.0fixed in weechat 0.2.6.1-1 (bookworm)2009
CVE-2009-0661 [MEDIUM] CVE-2009-0661: weechat - Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cau... Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read. Scope: local bookworm: resolved (fixed in 0.2.6.1-1) bullseye: resolved (fixed in 0.2.6.1-1) forky: resolved (fixed in 0.2.6.1-1) sid: resolved (fixed in 0.2.6.1-1
debian