CVE-2020-9760
Name
CVE-2020-9760
Description
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
NVD Severity
high
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
Vendor Advisory
https://weechat.org/doc/security/
Patch
https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
MLIST
https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
GENTOO
https://security.gentoo.org/glsa/202003-51
MLIST
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:weechat:weechat:*:*:*:*:*:*:*:*
weechat
>= 0.3.4
< 2.7.1
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status