SB2017102210 - Arch Linux update for irssi
Published: October 22, 2017 Updated: October 22, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2017-15227)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on.
2) Out-of-bounds read (CVE-ID: CVE-2017-15228)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string.
3) NULL pointer dereference (CVE-ID: CVE-2017-15721)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468. A remote attacker can perform a denial of service (DoS) attack.
4) Out-of-bounds read (CVE-ID: CVE-2017-15722)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
5) NULL pointer dereference (CVE-ID: CVE-2017-15723)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message. A remote attacker can perform a denial of service (DoS) attack.
6) Null pointer dereference (CVE-ID: CVE-2017-9468)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to NULL pointer dereference. A remote attacker can return a specially crafted DCC message without a source nick or host value and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.