Rapid7 Vulnerability & Exploit Database

RHSA-2003:342: Updated EPIC packages fix security vulnerability

Back to Search

RHSA-2003:342: Updated EPIC packages fix security vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/09/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated EPIC packages which fix an exploitable buffer overflow vulnerability are now available.

EPIC (Enhanced Programmable ircII Client) is an advanced ircII chat client designed to connect to Internet Relay Chat (IRC) servers. A bug in various versions of EPIC allows remote malicious IRC servers to cause a denial of service (crash) and execute arbitrary code via a CTCP request from a large nickname, which causes an incorrect length calculation. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0328 to this issue. Users of EPIC who may connect to untrusted servers are advised to upgrade to the packages in this erratum which contain a backported security fix to correct this issue.

Solution(s)

  • redhat-upgrade-epic

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;