8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.7%
Severity: High
Date : 2019-07-01
CVE-ID : CVE-2019-13045
Package : irssi
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-999
The package irssi before version 1.2.1-1 is vulnerable to arbitrary
code execution.
Upgrade to 1.2.1-1.
The problem has been fixed upstream in version 1.2.1.
Disable SASL authentication.
Irssi 1.0.x before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1,
when SASL is enabled, has a use after free when sending SASL login to
the server.
A remote attacker in position of man-in-the-middle or controlling the
IRC server might be able to crash or execute arbitrary code on an
affected host.
https://irssi.org/security/irssi_sa_2019_06.txt
https://www.openwall.com/lists/oss-security/2019/06/29/1
https://github.com/irssi/irssi/commit/d23b0d22cc611e43c88d99192a59f413f951a955
https://security.archlinux.org/CVE-2019-13045
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.7%