Description
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
References (5)
Core 5
Core References
Vendor Advisory x_refsource_misc
https://weechat.org/doc/security/
Patch, Third Party Advisory x_refsource_misc
https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202003-51
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html
Scores
CVSS v3
9.8
EPSS
0.0105
EPSS Percentile
77.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (3)
debian/debian_linux
8.0
debian/debian_linux
9.0
weechat/weechat
0.3.4 - 2.7.1
Published
Mar 23, 2020
Tracked Since
Feb 18, 2026