Vulnerability Description
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weechat | Weechat | >= 0.3.8, <= 2.7 |
| Fedoraproject | Fedora | 30 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.htmlMailing ListThird Party Advisory
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202003-51Third Party Advisory
- https://weechat.org/doc/security/Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.htmlMailing ListThird Party Advisory
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/03/msg00031.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/09/msg00018.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-8955?
CVE-2020-8955 is a vulnerability with a CVSS score of 9.8 (CRITICAL). irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other...
How severe is CVE-2020-8955?
CVE-2020-8955 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8955?
Check the references section above for vendor advisories and patch information. Affected products include: Weechat Weechat, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap, Debian Debian Linux.