SB2013100108 - Input validation error in ngIRCd
Published: October 1, 2013 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Input validation error (CVE-ID: CVE-2013-5580)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The (1) Conn_StartLogin and (2) cb_Read_Resolver_Result functions in conn.c in ngIRCd 18 through 20.2, when the configuration option NoticeAuth is enabled, does not properly handle the return code for the Handle_Write function, which allows remote attackers to cause a denial of service (assertion failure and server crash) via unspecified vectors, related to a "notice auth" message not being sent to a new client.
Remediation
Install update from vendor's website.
References
- http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=commit;h=309122017ebc6fff039a7cab1b82f632853d82d5
- http://arthur.barton.de/pipermail/ngircd-ml/2013-August/000645.html
- http://freecode.com/projects/ngircd/releases/357245
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115077.html
- http://osvdb.org/96590
- http://secunia.com/advisories/54567