First published: Wed Apr 02 2025(Updated: )
It was discovered that InspIRCd did not correctly handle certificate fingerprints, which could lead to spoofing. A remote attacker could possibly use this issue to bypass authentication. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-7142) It was discovered that InspIRCd did not correctly handle certain memory operations, which could lead to a NULL pointer dereference. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-20917) It was discovered that InspIRCd did not correctly handle certain memory operations, which could lead to a use-after-free. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2020-25269)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/inspircd | <3.4.0-2ubuntu1+esm1 | 3.4.0-2ubuntu1+esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/inspircd | <2.0.24-1ubuntu1+esm1 | 2.0.24-1ubuntu1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/inspircd | <2.0.20-5ubuntu0.1~esm1 | 2.0.20-5ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7405-1 is high due to its potential to allow remote attackers to bypass authentication.
To fix USN-7405-1, upgrade the InspIRCd package to the recommended versions for your Ubuntu release.
USN-7405-1 affects Ubuntu 16.04 LTS, 18.04 LTS, and 20.04 LTS.
The vulnerability in USN-7405-1 involves InspIRCd incorrectly handling certificate fingerprints, leading to potential spoofing.
Yes, a remote attacker could exploit USN-7405-1 to bypass authentication.