Description
A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms.
References (6)
Core 6
Core References
Release Notes, Vendor Advisory
https://forums.unrealircd.org/viewtopic.php?t=9340
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/
Scores
CVSS v3
7.5
EPSS
0.0098
EPSS Percentile
76.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (1)
unrealircd/unrealircd
6.1.0 - 6.1.4
Published
Dec 16, 2023
Tracked Since
Feb 18, 2026