CVE-2017-5356

HIGH

Irssi <0.8.21 - DoS

Title source: llm
STIX 2.1

Description

Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]).

References (6)

Core 6
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/96581
Exploit, Technical Description, Third Party Advisory x_refsource_misc
https://blog.fuzzing-project.org/55-Fuzzing-Irssi-with-Perl-Scripts.html
Patch, Vendor Advisory x_refsource_confirm
https://irssi.org/security/irssi_sa_2017_01.txt
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/12/8
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/13/2

Scores

CVSS v3 7.5
EPSS 0.0276
EPSS Percentile 86.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (2)
debian/debian_linux 7.0
irssi/irssi < 0.8.21
Published Mar 03, 2017
Tracked Since Feb 18, 2026