Vulnerability Details : CVE-2012-6084
modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2012-6084
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:ratbox:ircd-ratbox:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6084
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6084
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2012-6084
-
http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt
-
http://www.ratbox.org/download/ircd-ratbox-3.0.8.tar.bz2
Patch
-
https://github.com/atheme/charybdis/commit/ac0707aa61d9c20e9b09062294701567c9f41595.patch
Patch
-
http://www.stack.nl/~jilles/irc/charybdis-3.4.2.tbz2
Patch
-
http://www.debian.org/security/2013/dsa-2612
Debian -- Security Information -- DSA-2612-2 ircd-ratbox
-
http://openwall.com/lists/oss-security/2013/01/01/4
oss-security - Re: Charybdis: Improper assumptions in the server handshake code may lead to a remote crashPatch
Jump to