First published: Sun Sep 05 2021(Updated: )
WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WeeChat WeeChat | >=0.4.1<3.2.1 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40516 has a severity rating that indicates a denial of service vulnerability.
To fix CVE-2021-40516, upgrade to WeeChat version 3.2.1 or later.
CVE-2021-40516 is caused by a crafted WebSocket frame that leads to an out-of-bounds read.
WeeChat versions prior to 3.2.1 are affected by CVE-2021-40516.
Yes, CVE-2021-40516 can be exploited remotely by attackers targeting the Relay plugin.