8.1 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.5%
Multiple buffer overflows in BitchX IRC client 1.0-0c19 and earlier allow remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via long hostnames, nicknames, or channel names, which are not properly handled by the functions (1) send_ctcp, (2) cannot_join_channel, (3) cluster, (4) BX_compress_modes, (5) handle_oper_vision, and (6) ban_it.
CPE | Name | Operator | Version |
---|---|---|---|
colten_edwards:bitchx | colten edwards bitchx | le | 1.0.0c19 |
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000655
marc.info/?l=bugtraq&m=104766521328322&w=2
marc.info/?l=bugtraq&m=104852615211913&w=2
security.debian.org/pool/updates/main/i/ircii-pana/ircii-pana_1.0-0c16-2.1.diff.gz
www.debian.org/security/2003/dsa-306
www.securityfocus.com/bid/7096
www.securityfocus.com/bid/7097
www.securityfocus.com/bid/7099
www.securityfocus.com/bid/7100