First published: Sun Sep 05 2010(Updated: )
A denial of service flaw was found in the way Bip IRC Bouncer exchanged user credentials by initiating the IRC protocol session. A remote, unauthenticated user could send a specially crafted connection request, leading to bip daemon crash (NULL pointer dereference) References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595409">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595409</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Duckcorp Bip | =0.7.3 | |
Duckcorp Bip | =0.8.1 | |
Duckcorp Bip | =0.8.2 | |
Duckcorp Bip | =0.7.1 | |
Duckcorp Bip | =0.7.5 | |
Duckcorp Bip | =0.7.4 | |
Duckcorp Bip | <=0.8.5 | |
Duckcorp Bip | =0.8.0-rc1 | |
Duckcorp Bip | =0.8.0 | |
Duckcorp Bip | =0.7.2 | |
Duckcorp Bip | =0.8.0-rc0 | |
Duckcorp Bip | =0.8.4 | |
Duckcorp Bip | =0.8.3 | |
Duckcorp Bip | =0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3071 has a severity rating that indicates it poses a denial of service risk.
To fix CVE-2010-3071, upgrade to a version of Bip IRC Bouncer that has patched the vulnerability.
CVE-2010-3071 affects Bip versions from 0.7.0 through 0.8.5 inclusive.
Yes, CVE-2010-3071 can be exploited by a remote, unauthenticated user.
CVE-2010-3071 is associated with a denial of service attack that may cause the bip daemon to crash.