First published: Tue Sep 27 2016(Updated: )
The format_send_to_gui function in the format parsing code in Irssi before 0.8.20 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Irssi Irssi | <=0.8.19 | |
Debian Debian Linux | =8.0 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7045 has a high severity rating due to its potential to cause a denial of service through heap corruption.
To fix CVE-2016-7045, update Irssi to version 0.8.20 or later, and ensure your system packages are up-to-date.
CVE-2016-7045 affects Irssi versions prior to 0.8.20.
CVE-2016-7045 impacts Debian Linux 8.0 and Ubuntu Linux 16.04 along with any versions of Irssi prior to 0.8.20.
The attack vector for CVE-2016-7045 involves sending specially crafted strings that lead to a crash of the Irssi application.