First published: Wed Aug 29 2007(Updated: )
Stack-based buffer overflow in BitchX 1.1 Final allows remote IRC servers to execute arbitrary code via a long string in a MODE command, related to the p_mode variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bitchx Bitchx | =1.1-final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4584 is classified as critical due to the potential for remote code execution.
To fix CVE-2007-4584, upgrade BitchX to a later version that addresses the buffer overflow vulnerability.
Users of BitchX version 1.1 Final are affected by CVE-2007-4584 due to the stack-based buffer overflow.
Yes, CVE-2007-4584 can be exploited remotely by an attacker through specially crafted MODE commands.
The exploit vector for CVE-2007-4584 involves sending a long string in a MODE command to the affected BitchX client.