Upstream information

CVE-2017-8073 at MITRE

Description

WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3
SUSE Bugzilla entry: 1036467 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2017:1150-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • weechat >= 3.2-1.3
  • weechat-devel >= 3.2-1.3
  • weechat-lang >= 3.2-1.3
  • weechat-lua >= 3.2-1.3
  • weechat-perl >= 3.2-1.3
  • weechat-python >= 3.2-1.3
  • weechat-ruby >= 3.2-1.3
  • weechat-spell >= 3.2-1.3
  • weechat-tcl >= 3.2-1.3
Patchnames:
openSUSE Tumbleweed GA weechat-3.2-1.3


SUSE Timeline for this CVE

CVE page created: Sun Apr 23 20:15:14 2017
CVE page last modified: Thu Dec 7 13:14:29 2023