Security vulnerabilities in version 0.3.9.2
This page lists all known and fixed security vulnerabilities in version 0.3.9.2 (back to the list of all versions ).
Overview: 7 vulnerabilities
WSA
CVE
Score
Severity
Issue
Vulnerability type
Scope
Versions
Fix
Release date
WSA-2020-3
CVE-2020-9760
7.5
Buffer overflow on new IRC message 005 with nick prefixes.
Out-of-bounds write
IRC
0.3.4 → 2.7
2.7.1
Feb 20, 2020
WSA-2020-1
CVE-2020-8955
7.5
Buffer overflow on malformed IRC message 324 (channel mode).
Out-of-bounds write
IRC
0.3.8 → 2.7
2.7.1
Feb 20, 2020
WSA-2017-2
CVE-2017-14727
7.5
Use of invalid pointer in build of log filename.
Access of uninitialized pointer
Logger
0.3.2 → 1.9
1.9.1
Sep 23, 2017
WSA-2017-1
CVE-2017-8073
7.5
Buffer overflow when receiving a DCC file.
Out-of-bounds write
IRC
0.3.3 → 1.7
1.7.1
Apr 22, 2017
WSA-2013-3
-
7.5
Crash on IRC commands sent via Relay.
Access of uninitialized pointer
Relay
0.3.8 → 0.4.0
0.4.1
May 20, 2013
WSA-2013-2
-
5.5
Crash on send of unknown commands to IRC server.
Access of uninitialized pointer
IRC
0.3.0 → 0.4.0
0.4.1
May 20, 2013
WSA-2013-1
-
5.5
Crash on nicks monitored with /notify.
Access of uninitialized pointer
IRC
0.3.6 → 0.4.0
0.4.1
May 20, 2013
WSA-2020-3 : [IRC] Buffer overflow on new IRC message 005 with nick prefixes.
Vulnerability
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(
detail )
Affected versions
0.3.4 → 2.7
Description
A buffer overflow happens when a new IRC message 005 is received with longer nick prefixes.
Note: a "normal" IRC server should not send again a message 005 with new nick prefixes, so the problem should be limited to malicious IRC servers.
Mitigation
There is no known mitigation.
The upgrade of WeeChat to the latest stable version is highly recommended.
Credit
The issue was discovered by Stuart Nevans Locke.
WSA-2020-1 : [IRC] Buffer overflow on malformed IRC message 324 (channel mode).
Vulnerability
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(
detail )
Affected versions
0.3.8 → 2.7
Description
Buffer overflow when receiving a malformed IRC message 324 (channel mode).
Mitigation
There is no known mitigation.
The upgrade of WeeChat to the latest stable version is highly recommended.
Credit
The issue was discovered by Stuart Nevans Locke.
WSA-2017-2 : [Logger] Use of invalid pointer in build of log filename.
Vulnerability
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(
detail )
Access of uninitialized pointer
(
detail )
Affected versions
0.3.2 → 1.9
Description
Date/time conversion specifiers are expanded after replacing buffer local variables in name of log files. In some cases, this can lead to an error in function strftime and a crash caused by the use of an uninitialized buffer.
Mitigation
You can unload the logger plugin, thus stopping recording of all buffers:
/plugin unload logger
.
Credit
The issue was discovered by Joseph Bisch.
WSA-2017-1 : [IRC] Buffer overflow when receiving a DCC file.
Vulnerability
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(
detail )
Affected versions
0.3.3 → 1.7
Description
Buffer overflow when removing quotes in DCC filename.
Mitigation
With WeeChat ≥ 1.1, you can create a trigger:
/trigger add irc_dcc_quotes modifier "irc_in_privmsg" "${arguments} =~ ^[^ ]+ :${\x01}DCC SEND ${\x22} " "/.*//"
With any older version, there is no simple mitigation, you must upgrade WeeChat.
Credit
The issue was discovered by Tobias Stoeckmann.
WSA-2013-3 : [Relay] Crash on IRC commands sent via Relay.
Vulnerability
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(
detail )
Access of uninitialized pointer
(
detail )
Affected versions
0.3.8 → 0.4.0
Description
Strings are built with uncontrolled format when IRC commands are redirected by relay plugin. If the output or redirected command contains formatting chars like "%", this can lead to a crash of WeeChat.
Mitigation
You can remove all relays of type "irc", see
/help relay
.
WSA-2013-2 : [IRC] Crash on send of unknown commands to IRC server.
Vulnerability
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
(
detail )
Access of uninitialized pointer
(
detail )
Affected versions
0.3.0 → 0.4.0
Description
Strings are built with uncontrolled format when unknown IRC commands are sent to server, if option
irc.network.send_unknown_commands
is enabled.
Mitigation
There are multiple ways to mitigate this issue:
Turn off option to send unknown commands: /set irc.network.send_unknown_commands off
Do not use formatting chars like "%" when sending unknown commands to server.
WSA-2013-1 : [IRC] Crash on nicks monitored with /notify.
Vulnerability
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
(
detail )
Access of uninitialized pointer
(
detail )
Affected versions
0.3.6 → 0.4.0
Description
Strings are built with uncontrolled format when nicks containing "%" are monitored with command
/notify
.
Mitigation
Do not use command
/notify
with nicks containing formatting chars like "%".