Multiple vulnerabilities in WeeChat



Published: 2020-02-12 | Updated: 2020-03-25
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2020-8955
CVE-2020-9760
CVE-2020-9759
CWE-ID CWE-119
CWE-476
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
WeeChat
Client/Desktop applications / Messaging software

Vendor WeeChat.org

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

Updated 25.03.2020

Added vulnerabilities #2-3

1) Buffer overflow

EUVDB-ID: #VU25599

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-8955

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing IRC messages in irc_mode_channel_update() function in plugins/irc/irc-mode.c in WeeChat. A remote attacker can send a specially crafted IRC message 324 (channel mode), trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WeeChat: 2.0 - 2.7

External links

http://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
http://weechat.org/doc/security/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU26384

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9760

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when a new IRC message 005 is received with longer nick prefixes. A remote attacker can send a specially crafted message 005, trigger memory corruption and cause a denial of service condition on the target system when a new mode is set for a nick.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WeeChat: 0.3.4 - 2.7

External links

http://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
http://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
http://weechat.org/doc/security/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU26383

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9759

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the "callback" function. A remote attacker can send a specially crafted message 352 (who) and perform a denial of service (DoS) attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability..

Vulnerable software versions

WeeChat: 0.4.0 - 2.7

External links

http://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a
http://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
http://weechat.org/doc/security/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###