First published: Tue Oct 01 2013(Updated: )
The (1) Conn_StartLogin and (2) cb_Read_Resolver_Result functions in conn.c in ngIRCd 18 through 20.2, when the configuration option NoticeAuth is enabled, does not properly handle the return code for the Handle_Write function, which allows remote attackers to cause a denial of service (assertion failure and server crash) via unspecified vectors, related to a "notice auth" message not being sent to a new client.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ngircd | =18.0 | |
Ngircd | =19.0 | |
Ngircd | =19.1 | |
Ngircd | =20.0 | |
Ngircd | =20.1 | |
Ngircd | =20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5580 has a severity rating that indicates it can lead to a denial of service condition.
To fix CVE-2013-5580, users should upgrade ngIRCd to version 20.3 or later where the vulnerability is addressed.
Versions of ngIRCd from 18.0 up to 20.2 are affected by CVE-2013-5580.
CVE-2013-5580 enables remote attackers to execute a denial-of-service attack.
Yes, CVE-2013-5580 is associated with the NoticeAuth configuration option in ngIRCd.