Description
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2017/dsa-4016
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
Mitigation, Patch, Vendor Advisory x_refsource_confirm
https://irssi.org/security/irssi_sa_2017_10.txt
Mailing List, Mitigation, Patch, Third Party Advisory x_refsource_confirm
http://openwall.com/lists/oss-security/2017/10/22/4
Scores
CVSS v3
5.9
EPSS
0.0067
EPSS Percentile
71.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
7.0
debian/debian_linux
8.0
debian/debian_linux
9.0
irssi/irssi
< 1.0.4
Published
Oct 22, 2017
Tracked Since
Feb 18, 2026