First published: Sat Jun 29 2019(Updated: )
Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Irssi Irssi | >=0.8.18<1.0.8 | |
Irssi Irssi | >=1.1.0<1.1.3 | |
Irssi Irssi | >=1.2.0<1.2.1 | |
debian/irssi | 1.2.3-1 1.4.3-2 1.4.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13045 is classified as a medium severity vulnerability.
To fix CVE-2019-13045, upgrade Irssi to version 1.2.3-1, 1.4.3-2, or 1.4.5-1.
Irssi versions before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1 are affected.
CVE-2019-13045 can lead to a use after free condition when sending SASL login to the server.
Yes, CVE-2019-13045 occurs when SASL is enabled in Irssi.