CVE-2020-9760

CRITICAL

Weechat < 2.7.1 - Buffer Overflow

Title source: rule
STIX 2.1

Description

An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.

References (5)

Core 5
Core References
Vendor Advisory x_refsource_misc
https://weechat.org/doc/security/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-51
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html

Scores

CVSS v3 9.8
EPSS 0.0105
EPSS Percentile 77.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (3)
debian/debian_linux 8.0
debian/debian_linux 9.0
weechat/weechat 0.3.4 - 2.7.1
Published Mar 23, 2020
Tracked Since Feb 18, 2026