First published: Mon Aug 09 2010(Updated: )
An out-of-range flaw was found in znc where if it received a "PING" from a client without an argument, std::string would throw a std::out_of_range exception which killed znc. This is fixed in subversion [1]. Some unsafe substr() calls were fixed as well. These are of lesser impact because a valid login is required in order to cause a std::out_of_range exception. This is also fixed in subversion [2]. [1] <a href="http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093">http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093</a> [2] <a href="http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095">http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ZNC | =0.092 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2812 is classified as a moderate severity vulnerability due to the potential for denial of service.
To fix CVE-2010-2812, update to the patched version of ZNC that addresses this vulnerability.
CVE-2010-2812 affects ZNC version 0.092, specifically addressing an out-of-range flaw in its handling of 'PING' commands.
The impact of CVE-2010-2812 is that it can cause ZNC to crash when it receives a specific malformed 'PING' request.
As of now, there are no widely reported exploits specifically targeting CVE-2010-2812.