ID CVE-2007-5226 Type cve Reporter NVD Modified 2008-09-05T17:30:11
Description
irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via an ACTION command without a parameter, which triggers a NULL pointer dereference, as demonstrated using a blank /me message from irssi.
{"assessment": {"system": "", "name": "", "href": ""}, "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "type": "cve", "viewCount": 0, "bulletinFamily": "NVD", "edition": 1, "published": "2007-10-05T17:17:00", "objectVersion": "1.2", "history": [], "title": "CVE-2007-5226", "reporter": "NVD", "hash": "4912892ddb3685000e4890033d8795349d3fa1ccdb15a9530f6875d5c9af6a64", "lastseen": "2016-09-03T09:35:04", "id": "CVE-2007-5226", "scanner": [], "description": "irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via an ACTION command without a parameter, which triggers a NULL pointer dereference, as demonstrated using a blank /me message from irssi.", "modified": "2008-09-05T17:30:11", "cvelist": ["CVE-2007-5226"], "cpe": ["cpe:/a:dircproxy:dircproxy:1.2.0"], "references": ["https://bugzilla.redhat.com/show_bug.cgi?id=319301", "http://dircproxy.securiweb.net/ticket/89"], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5226", "enchantments": {"vulnersScore": 5.0}}
{"result": {"freebsd": [{"id": "A1EF3FC0-8AD0-11DC-9490-0016179B2DD5", "type": "freebsd", "title": "dircproxy -- remote denial of service", "description": "\nSecuriweb reports:\n\ndircproxy allows remote attackers to cause a denial of\n\t service (segmentation fault) via an ACTION command without a\n\t parameter, which triggers a NULL pointer dereference, as\n\t demonstrated using a blank /me message from irssi.\n\n", "published": "2006-09-06T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vuxml.freebsd.org/freebsd/a1ef3fc0-8ad0-11dc-9490-0016179b2dd5.html", "cvelist": ["CVE-2007-5226"], "lastseen": "2016-09-26T17:24:59"}], "nessus": [{"id": "FREEBSD_PKG_A1EF3FC08AD011DC94900016179B2DD5.NASL", "type": "nessus", "title": "FreeBSD : dircproxy -- remote denial of service (a1ef3fc0-8ad0-11dc-9490-0016179b2dd5)", "description": "Securiweb reports :\n\ndircproxy allows remote attackers to cause a denial of service (segmentation fault) via an ACTION command without a parameter, which triggers a NULL pointer dereference, as demonstrated using a blank /me message from irssi.", "published": "2007-11-05T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=27622", "cvelist": ["CVE-2007-5226"], "lastseen": "2017-10-29T13:40:49"}], "openvas": [{"id": "OPENVAS:58773", "type": "openvas", "title": "FreeBSD Ports: dirproxy", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "published": "2008-09-04T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=58773", "cvelist": ["CVE-2007-5226"], "lastseen": "2017-07-02T21:10:25"}]}}