Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1518721454.9434.0.camel@gmail.com>
Date: Thu, 15 Feb 2018 20:04:14 +0100
From: Ailin Nemui <ailin.nemui@...il.com>
To: oss-security@...ts.openwall.com
Subject: Irssi 1.1.1&1.0.7: CVE-2018-7054, CVE-2018-7053, CVE-2018-7050,
 CVE-2018-7052, CVE-2018-7051

IRSSI-SA-2018-02 Irssi Security Advisory [1]
============================================
CVE-2018-7054, CVE-2018-7053, CVE-2018-7050, CVE-2018-7052, CVE-2018-
7051

Description
-----------

Multiple vulnerabilities have been located in Irssi.

(a) Use after free when server is disconnected during netsplits. Found
    by Joseph Bisch. (CWE-416, CWE-825)

    CVE-2018-7054 [2] was assigned to this issue.

(b) Use after free when SASL messages are received in unexpected order.
    Found by Joseph Bisch. (CWE-416, CWE-691)

    CVE-2018-7053 [3] was assigned to this issue.

(c) Null pointer dereference when an "empty" nick has been observed by
    Irssi. Found by Joseph Bisch. (CWE-476, CWE-475)

    CVE-2018-7050 [4] was assigned to this issue.

(d) When the number of windows exceed the available space, Irssi would
    crash due to Null pointer dereference. Found by Joseph Bisch.
    (CWE-690)

    CVE-2018-7052 [5] was assigned to this issue.

(e) Certain nick names could result in out of bounds access when
    printing theme strings. Found by Oss-Fuzz. (CWE-126)

    CVE-2018-7051 [6] was assigned to this issue.


Affected versions
-----------------

(a) Irssi 1.0.0 and later

(b) Irssi 0.8.18 and later

(c) All Irssi versions that we observed

(d) All Irssi versions that we observed

(e) Irssi 0.8.7 and later


Fixed in
--------

Irssi 1.0.7, 1.1.1


Recommended action
------------------

Upgrade to the latest stable Irssi version. Irssi 1.0.7 and 1.1.1 are
maintenance release in the 1.0 and 1.1 series, without any new
features.

After installing the updated packages, one can issue the /upgrade
command to load the new binary. TLS connections will require
/reconnect.


Mitigating facts
----------------

(b) requires a non-conforming ircd

(c) requires a broken ircd or control over the ircd

(d) depends on non-default configuration



References
----------

[1] https://irssi.org/security/irssi_sa_2018_02.txt
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050
[5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052
[6] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.