SB2017102210 - Arch Linux update for irssi



SB2017102210 - Arch Linux update for irssi

Published: October 22, 2017 Updated: October 22, 2017

Security Bulletin ID SB2017102210
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 83% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2017-15227)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on.


2) Out-of-bounds read (CVE-ID: CVE-2017-15228)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string.


3) NULL pointer dereference (CVE-ID: CVE-2017-15721)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468. A remote attacker can perform a denial of service (DoS) attack.


4) Out-of-bounds read (CVE-ID: CVE-2017-15722)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.


5) NULL pointer dereference (CVE-ID: CVE-2017-15723)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message. A remote attacker can perform a denial of service (DoS) attack.


6) Null pointer dereference (CVE-ID: CVE-2017-9468)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to NULL pointer dereference. A remote attacker can return a specially crafted DCC message without a source nick or host value and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.