First published: Thu Feb 15 2018(Updated: )
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/irssi | 1.2.3-1 1.4.3-2 1.4.5-1 | |
Irssi Irssi | <1.0.7 | |
Irssi Irssi | =1.1.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7053 has a severity rating of medium due to the potential for a use-after-free vulnerability.
To fix CVE-2018-7053, upgrade to Irssi version 1.0.7 or later, or versions 1.1.1 and above.
CVE-2018-7053 affects Irssi versions prior to 1.0.7 and 1.1.x before 1.1.1.
Yes, CVE-2018-7053 can potentially be exploited remotely if an attacker sends unexpected SASL messages.
CVE-2018-7053 impacts Irssi installations on various platforms including Debian and Ubuntu.