Description
Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]).
References (6)
Core 6
Core References
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/96581
Exploit, Technical Description, Third Party Advisory x_refsource_misc
https://blog.fuzzing-project.org/55-Fuzzing-Irssi-with-Perl-Scripts.html
Patch, Vendor Advisory x_refsource_confirm
https://irssi.org/security/irssi_sa_2017_01.txt
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/12/8
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/13/2
Scores
CVSS v3
7.5
EPSS
0.0276
EPSS Percentile
86.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (2)
debian/debian_linux
7.0
irssi/irssi
< 0.8.21
Published
Mar 03, 2017
Tracked Since
Feb 18, 2026