Unrealircd : Security Vulnerabilities, CVEs, Published In 2017
UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.
Max CVSS
5.5
EPSS Score
0.04%
Published
2017-08-23
Updated
2019-10-03
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
Max CVSS
8.1
EPSS Score
0.85%
Published
2017-01-18
Updated
2017-01-20
2 vulnerabilities found