CVE-2020-8955

CRITICAL

Weechat < 2.7 - Buffer Overflow

Title source: rule
STIX 2.1

Description

irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).

References (9)

Core 9
Core References
Vendor Advisory x_refsource_misc
https://weechat.org/doc/security/
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-51
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html

Scores

CVSS v3 9.8
EPSS 0.1421
EPSS Percentile 94.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (8)
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 30
fedoraproject/fedora 31
fedoraproject/fedora 32
opensuse/backports_sle 15.0 (2 CPE variants)
opensuse/leap 15.1
weechat/weechat 0.3.8 - 2.7
Published Feb 12, 2020
Tracked Since Feb 18, 2026