Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID:  <87k5ipmwv3.fsf@lillypad.riseup.net>
Date:  Tue, 22 Apr 2008 16:57:04 -0400
From:  Micah Anderson <micah@...eup.net>
To: oss-security@...ts.openwall.com
Subject:  CVE Request: inspircd


Versions prior to 1.1.17 of InspIRCd are vulnerable to a remotely
triggerable buffer overflow which can lead to a Denial of Service
(daemon crash) when the namesx and uhnames modules are loaded. 

InspIRCd is a modular C++ IRCd (IRC daemon) for Linux, BSD, Windows and
Apple OS X systems created to provide a stable, modern, and lightweight
IRCd written from scratch.

Reference: http://inspircd.org/forum/showthread.php?t=2945

How the issue can be triggered:

if you load both the namesx and uhnames modules, then set your nicklen
to 31 characters and your ident len is 12 and and your channel len is
64, then you can crash the ircd by joining a lot of users to a channel
with 31 char nicks, 12 char idents and very long hostnames, and then
joining a single final user to the channel who has uhnames

workaround: unload uhnames or upgrade to 1.1.17

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.