First published: Mon Dec 23 2013(Updated: )
Stack-based buffer overflow in fish.cpp in the Fish plugin for ZNC, as used in ZNC for Windows (znc-msvc) 0.206 and earlier, allows remote attackers to cause a denial of service (crash) via a long string in a DH1080_INIT message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZNC znc-msvc | <=0.206 | |
ZNC znc-msvc | =0.076 | |
ZNC znc-msvc | =0.077 | |
ZNC znc-msvc | =0.078 | |
ZNC znc-msvc | =0.079 | |
ZNC znc-msvc | =0.080 | |
ZNC znc-msvc | =0.089 | |
ZNC znc-msvc | =0.090 | |
ZNC znc-msvc | =0.093 | |
ZNC znc-msvc | =0.094 | |
ZNC znc-msvc | =0.095 | |
ZNC znc-msvc | =0.097 | |
ZNC znc-msvc | =0.098 | |
ZNC znc-msvc | =0.202 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7049 has a severity rating of medium due to the potential for denial of service.
To fix CVE-2013-7049, upgrade ZNC for Windows past version 0.206 to ensure the vulnerability is patched.
CVE-2013-7049 exploits a stack-based buffer overflow in the Fish plugin for ZNC.
Users of ZNC for Windows versions 0.206 and earlier are affected by CVE-2013-7049.
CVE-2013-7049 enables remote attackers to cause a denial of service via a crafted DH1080_INIT message.