First published: Mon Aug 09 2010(Updated: )
An out-of-range flaw was found in znc where if it received a "PING" from a client without an argument, std::string would throw a std::out_of_range exception which killed znc. This is fixed in subversion [1]. Some unsafe substr() calls were fixed as well. These are of lesser impact because a valid login is required in order to cause a std::out_of_range exception. This is also fixed in subversion [2]. [1] <a href="http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093">http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2093</a> [2] <a href="http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095">http://znc.svn.sourceforge.net/viewvc/znc?view=revision&revision=2095</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ZNC | <2093 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-622600 is considered moderate due to the denial of service caused by an out-of-range exception that can crash the ZNC service.
To fix REDHAT-BUG-622600, update to the latest version of ZNC that includes the patch for the out-of-range flaw.
ZNC versions prior to 2093 are affected by REDHAT-BUG-622600.
The vulnerability in REDHAT-BUG-622600 is an out-of-range error triggered by a malformed "PING" command, resulting in a service crash.
Yes, REDHAT-BUG-622600 also addresses other unsafe substr() calls within ZNC that have a lesser impact.