Vulnerability Details : CVE-2017-8073
WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.
Vulnerability category: Overflow
Products affected by CVE-2017-8073
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:weechat:weechat:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-8073
2.93%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-8073
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-8073
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-8073
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/
[SECURITY] Fedora 31 Update: weechat-2.7.1-1.fc31 - package-announce - Fedora Mailing-Lists
-
http://www.debian.org/security/2017/dsa-3836
Debian -- Security Information -- DSA-3836-1 weechatThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/
[SECURITY] Fedora 32 Update: weechat-2.7.1-1.fc32 - package-announce - Fedora Mailing-Lists
-
https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b
irc: fix parsing of DCC filename · weechat/weechat@2fb346f · GitHubPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/97987
WeeChat CVE-2017-8073 Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/
[SECURITY] Fedora 30 Update: weechat-2.7.1-1.fc30 - package-announce - Fedora Mailing-Lists
-
https://weechat.org/download/security/
WeeChat :: documentation :: securityPatch;Vendor Advisory
-
https://weechat.org/news/95/20170422-Version-1.7.1/
WeeChat, the extensible chat clientRelease Notes;Vendor Advisory
Jump to