First published: Thu Nov 18 2004(Updated: )
Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BNC | =2.4.8 | |
BNC | =2.6 | |
BNC | =2.8.8 | |
BNC | =2.6.4 | |
BNC | =2.2.4 | |
BNC | =2.8.9 | |
BNC | =2.6.2 | |
BNC | =2.4.6 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Gentoo Linux | ||
Debian | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1052 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-1052, upgrade to a patched version of BNC, specifically version 2.8.10 or later.
CVE-2004-1052 affects BNC versions 2.8.9 and earlier, along with other potentially vulnerable versions.
Yes, CVE-2004-1052 can be exploited remotely via crafted IRC server responses.
Users running affected versions of BNC, particularly those in IRC environments, are at risk from CVE-2004-1052.