ID CVE-2010-1156
Summary core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.
References
Vulnerable Configurations
  • Irssi 0.8.5
    cpe:2.3:a:irssi:irssi:0.8.5
  • Irssi 0.8.4
    cpe:2.3:a:irssi:irssi:0.8.4
  • Irssi 0.8.9
    cpe:2.3:a:irssi:irssi:0.8.9
  • Irssi 0.8.8
    cpe:2.3:a:irssi:irssi:0.8.8
  • Irssi 0.8.7
    cpe:2.3:a:irssi:irssi:0.8.7
  • Irssi 0.8.13
    cpe:2.3:a:irssi:irssi:0.8.13
  • Irssi 0.8.6
    cpe:2.3:a:irssi:irssi:0.8.6
  • cpe:2.3:a:irssi:irssi:0.8.10:rc5
    cpe:2.3:a:irssi:irssi:0.8.10:rc5
  • cpe:2.3:a:irssi:irssi:0.8.15:rc1
    cpe:2.3:a:irssi:irssi:0.8.15:rc1
  • Irssi 0.8.14
    cpe:2.3:a:irssi:irssi:0.8.14
  • cpe:2.3:a:irssi:irssi:0.8.13:rc1
    cpe:2.3:a:irssi:irssi:0.8.13:rc1
  • Irssi 0.8.12
    cpe:2.3:a:irssi:irssi:0.8.12
  • cpe:2.3:a:irssi:irssi:0.8.12:rc1
    cpe:2.3:a:irssi:irssi:0.8.12:rc1
  • cpe:2.3:a:irssi:irssi:0.8.11:rc1
    cpe:2.3:a:irssi:irssi:0.8.11:rc1
  • Irssi 0.8.11
    cpe:2.3:a:irssi:irssi:0.8.11
  • cpe:2.3:a:irssi:irssi:0.8.11:rc2
    cpe:2.3:a:irssi:irssi:0.8.11:rc2
  • Irssi 0.8.10
    cpe:2.3:a:irssi:irssi:0.8.10
  • cpe:2.3:a:irssi:irssi:0.8.10:rc8
    cpe:2.3:a:irssi:irssi:0.8.10:rc8
  • cpe:2.3:a:irssi:irssi:0.8.10:rc7
    cpe:2.3:a:irssi:irssi:0.8.10:rc7
  • cpe:2.3:a:irssi:irssi:0.8.10:rc6
    cpe:2.3:a:irssi:irssi:0.8.10:rc6
  • Irssi 0.8.3
    cpe:2.3:a:irssi:irssi:0.8.3
  • Irssi 0.8.2
    cpe:2.3:a:irssi:irssi:0.8.2
  • Irssi 0.8.1
    cpe:2.3:a:irssi:irssi:0.8.1
  • Irssi 0.8.0
    cpe:2.3:a:irssi:irssi:0.8.0
CVSS
Base: 4.3 (as of 19-04-2010 - 12:17)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2010-079.NASL
    description Multiple vulnerabilities has been found and corrected in irssi : Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate (CVE-2010-1155). core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel (CVE-2010-1156). Additionally the updated packages disables the SSLv2 protocol and enables the SSLv3 and TLSv1 protocols for added security. The updated packages have been patched to correct these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 48180
    published 2010-07-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=48180
    title Mandriva Linux Security Advisory : irssi (MDVSA-2010:079)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-929-2.NASL
    description USN-929-1 fixed vulnerabilities in irssi. The upstream changes introduced a regression when using irssi with SSL and an IRC proxy. This update fixes the problem. We apologize for the inconvenience. It was discovered that irssi did not perform certificate host validation when using SSL connections. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2010-1155) Aurelien Delaitre discovered that irssi could be made to dereference a NULL pointer when a user left the channel. A remote attacker could cause a denial of service via application crash. (CVE-2010-1156) This update also adds SSLv3 and TLSv1 support, while disabling the old, insecure SSLv2 protocol. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 45589
    published 2010-04-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=45589
    title Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : irssi regression (USN-929-2)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-6629.NASL
    description This release fixes two security issues: The first being that Irssi didn't check hostname on SSL connections and the other being a hard to exploit remote crash bug. For a complete listing of the changes and bugfixes since 0.8.14, please have a look at the http://irssi.org/news/ChangeLog Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 47443
    published 2010-07-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=47443
    title Fedora 12 : irssi-0.8.15-1.fc12 (2010-6629)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-929-1.NASL
    description It was discovered that irssi did not perform certificate host validation when using SSL connections. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2010-1155) Aurelien Delaitre discovered that irssi could be made to dereference a NULL pointer when a user left the channel. A remote attacker could cause a denial of service via application crash. (CVE-2010-1156) This update also adds SSLv3 and TLSv1 support, while disabling the old, insecure SSLv2 protocol. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 45551
    published 2010-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=45551
    title Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : irssi vulnerabilities (USN-929-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_3B7967F149E811DF83FB0015587E2CC1.NASL
    description Two vulnerabilities have found in irssi. The first issue could allow man-in-the-middle attacks due to a missing comparison of SSL server hostnames and the certificate domain names (e.g. CN). A second vulnerability, related to the nick matching code, could be triggered by remote attackers in order to crash an irssi client when leaving a channel.
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 45570
    published 2010-04-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=45570
    title FreeBSD : irssi -- multiple vulnerabilities (3b7967f1-49e8-11df-83fb-0015587e2cc1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_IRSSI-100427.NASL
    description irssi did not check the identity information of a remote hosts's certificate. Attackers could exploit that for a man-in-the-middle attack (CVE-2010-1155). irssi could crash if someone changed nick while the victim was leaving the channel (CVE-2010-1156).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 46190
    published 2010-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46190
    title openSUSE Security Update : irssi (openSUSE-SU-2010:0183-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_IRSSI-100427.NASL
    description irssi did not check the identity information of a remote hosts's certificate. Attackers could exploit that for a man-in-the-middle attack (CVE-2010-1155). irssi could crash if someone changed nick while the victim was leaving the channel (CVE-2010-1156).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 46188
    published 2010-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46188
    title openSUSE Security Update : irssi (openSUSE-SU-2010:0183-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_IRSSI-100427.NASL
    description irssi did not check the identity information of a remote hosts's certificate. Attackers could exploit that for a man-in-the-middle attack (CVE-2010-1155). irssi could crash if someone changed nick while the victim was leaving the channel (CVE-2010-1156).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 46186
    published 2010-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46186
    title openSUSE Security Update : irssi (openSUSE-SU-2010:0183-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2010-116-01.NASL
    description New irssi packages are available for Slackware 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 45611
    published 2010-04-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=45611
    title Slackware 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / current : irssi (SSA:2010-116-01)
refmap via4
confirm
fedora FEDORA-2010-6629
mlist
  • [oss-security] 20100411 CVE request: irssi 0.8.15
  • [oss-security] 20100412 Re: CVE request: irssi 0.8.15
  • [oss-security] 20100413 Re: CVE request: irssi 0.8.15
sectrack 1023845
secunia
  • 39365
  • 39620
  • 39797
slackware SSA:2010-116-01
suse SUSE-SR:2010:011
ubuntu USN-929-1
vupen
  • ADV-2010-0856
  • ADV-2010-0987
  • ADV-2010-1107
  • ADV-2010-1110
xf irssi-unspecified-dos(57791)
Last major update 22-05-2010 - 01:46
Published 16-04-2010 - 15:30
Last modified 16-08-2017 - 21:32
Back to Top