First published: Mon Jun 15 2020(Updated: )
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ngircd | <=25.0 | |
Ngircd | =26.0-rc1 | |
Debian Linux | =8.0 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14148 is classified as a medium severity vulnerability due to its potential for causing out-of-bounds access.
To fix CVE-2020-14148, update ngIRCd to version 26~rc2 or later.
CVE-2020-14148 is caused by an out-of-bounds access in the Server-Server protocol implementation of ngIRCd.
Versions of ngIRCd prior to 26~rc2, including all versions up to and including 25.0 and 26.0-rc1, are affected by CVE-2020-14148.
Exploiting CVE-2020-14148 may lead to unpredictable behavior or service disruptions in affected systems.