First published: Thu Aug 30 2012(Updated: )
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XChat | =2.8.7-b | |
XChat | =1.2.1 | |
XChat | =1.9.8 | |
XChat | =2.0.3 | |
XChat | =1.8.4 | |
XChat | =1.9.4 | |
XChat | =2.8.7b | |
XChat | =2.8.3 | |
XChat | =2.8.1 | |
XChat | =1.8.0 | |
XChat | =1.9.1 | |
XChat | =1.8.2 | |
XChat | =2.8.6 | |
XChat | =1.8.3 | |
XChat | =2.0.1 | |
XChat | =2.0.8 | |
XChat | =1.3.10 | |
XChat | =2.8.8 | |
XChat | =1.4 | |
XChat | =2.8.7-e | |
XChat | =1.8.5 | |
XChat | =2.0.7 | |
XChat | =1.5.6 | |
XChat | =1.3.13 | |
XChat | =1.3.9 | |
XChat | =1.8.1 | |
XChat | =1.8.7 | |
XChat | =1.9.2 | |
XChat | =1.9.9 | |
XChat | =1.9.3 | |
XChat | =1.3.12 | |
XChat | =2.0.4 | |
XChat | =1.8.8 | |
XChat | =1.4.1 | |
XChat | =2.8.3-c | |
XChat | =2.8.0 | |
XChat | =1.9.7 | |
XChat | =1.4.3 | |
XChat | =1.4.2 | |
XChat | =2.6.7 | |
XChat | =2.8.5-e | |
XChat | =2.0.2 | |
XChat | =2.0.6 | |
XChat | =2.8.4 | |
XChat | =2.8.7-a | |
XChat | =2.8.7-c | |
XChat | =1.9.6 | |
XChat | =2.0.0 | |
XChat | =1.8.9 | |
XChat | =2.0.5 | |
XChat | =1.9.5 | |
XChat | =2.8.5-b | |
XChat | =2.8.7-f | |
XChat | <=2.8.9 | |
XChat | =2.8.3-e | |
XChat | =1.3.11 | |
XChat | =2.8.7-d | |
XChat | =1.8.6 | |
XChat | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5129 is classified as a high-severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2011-5129, upgrade to XChat version 2.8.10 or later.
CVE-2011-5129 can be exploited by sending a specially crafted long response string to the application.
XChat versions 2.8.9 and earlier, along with multiple earlier versions, are affected by CVE-2011-5129.
The impacts of CVE-2011-5129 include application crashes and the potential for remote code execution.