|
Message-ID: <4C4FEFBF.10905@redhat.com> Date: Wed, 28 Jul 2010 10:52:15 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com> Subject: CVE Request -- KVIrc -- Remote CTCP commands execution via specially-crafted CTCP parameter Hi Steve, user with nickname 'unic0rn' reported: [1] https://svn.kvirc.de/kvirc/ticket/858 a deficiency in the way KVIrc IRC client extracted the "next" CTCP parameter from message pointer. A remote, authenticated attacker, valid KVIrc user, could send a specially-crafted DCC Client-To-Client Protocol (CTCP) message, like: /ctcp nickname DCC GET\rQUIT\r /ctcp nickname DCC GET\rPRIVMSG\40#channel\40:epic\40fail\r which could lead to / allow remote (KVIrc) CTCP commands execution. Different vulnerability than CVE-2010-2451: [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2451 and CVE-2010-2452: [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2452 Upstream patch: [3] https://svn.kvirc.de/kvirc/changeset/4693 Workaround: (from [1]) /option boolNotifyFailedDccHandshakes 0 References: [4] http://bugs.gentoo.org/show_bug.cgi?id=330111 Could you please allocate a CVE id for this? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.