Upstream information

CVE-2018-14055 at MITRE

Description

ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:N/AC:L/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 6.5
Vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
CVSSv3 Version 3
SUSE Bugzilla entry: 1101281 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 12 SP2
  • znc >= 1.7.1-2.1
  • znc-devel >= 1.7.1-2.1
  • znc-lang >= 1.7.1-2.1
  • znc-perl >= 1.7.1-2.1
  • znc-python3 >= 1.7.1-2.1
  • znc-tcl >= 1.7.1-2.1
Patchnames:
openSUSE-2019-571
openSUSE Leap 15.0
  • znc >= 1.7.1-lp150.2.6.1
  • znc-devel >= 1.7.1-lp150.2.6.1
  • znc-lang >= 1.7.1-lp150.2.6.1
  • znc-perl >= 1.7.1-lp150.2.6.1
  • znc-python3 >= 1.7.1-lp150.2.6.1
  • znc-tcl >= 1.7.1-lp150.2.6.1
Patchnames:
openSUSE-2019-571
openSUSE Tumbleweed
  • znc >= 1.8.2-1.11
  • znc-devel >= 1.8.2-1.11
  • znc-lang >= 1.8.2-1.11
  • znc-perl >= 1.8.2-1.11
  • znc-python3 >= 1.8.2-1.11
  • znc-tcl >= 1.8.2-1.11
Patchnames:
openSUSE Tumbleweed GA znc-1.8.2-1.11


SUSE Timeline for this CVE

CVE page created: Sun Jul 15 08:28:09 2018
CVE page last modified: Fri Dec 8 17:17:59 2023