vulnerability

SUSE: CVE-2017-8073: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 23, 2017
Added
May 2, 2017
Modified
Mar 6, 2021

Description

WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.

Solution(s)

suse-upgrade-weechatsuse-upgrade-weechat-aspellsuse-upgrade-weechat-aspell-debuginfosuse-upgrade-weechat-debuginfosuse-upgrade-weechat-debugsourcesuse-upgrade-weechat-develsuse-upgrade-weechat-docsuse-upgrade-weechat-guilesuse-upgrade-weechat-guile-debuginfosuse-upgrade-weechat-langsuse-upgrade-weechat-luasuse-upgrade-weechat-lua-debuginfosuse-upgrade-weechat-perlsuse-upgrade-weechat-perl-debuginfosuse-upgrade-weechat-pythonsuse-upgrade-weechat-python-debuginfosuse-upgrade-weechat-rubysuse-upgrade-weechat-ruby-debuginfosuse-upgrade-weechat-tclsuse-upgrade-weechat-tcl-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.