Vulnerabilites related to unrealircd - unrealircd
CVE-2013-6413 (GCVE-0-2013-6413)
Vulnerability from cvelistv5
Published
2014-05-19 14:00
Modified
2024-08-06 17:39
Severity ?
CWE
  • n/a
Summary
Use-after-free vulnerability in UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7384 was assigned for the NULL pointer dereference.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.283Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/379"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
          },
          {
            "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/383"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.  NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7384 was assigned for the NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-19T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/379"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
        },
        {
          "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/383"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6413",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.  NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7384 was assigned for the NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/379"
            },
            {
              "name": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221",
              "refsource": "CONFIRM",
              "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
            },
            {
              "name": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
            },
            {
              "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/383"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6413",
    "datePublished": "2014-05-19T14:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.283Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-50784 (GCVE-0-2023-50784)
Vulnerability from cvelistv5
Published
2023-12-16 00:00
Modified
2024-08-02 22:23
Severity ?
CWE
  • n/a
Summary
A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:23:43.649Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.unrealircd.org/index/news"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://forums.unrealircd.org/viewtopic.php?t=9340"
          },
          {
            "name": "FEDORA-2023-41f41fbb69",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/"
          },
          {
            "name": "FEDORA-2023-7c6c696102",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-26T03:06:13.346235",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.unrealircd.org/index/news"
        },
        {
          "url": "https://forums.unrealircd.org/viewtopic.php?t=9340"
        },
        {
          "name": "FEDORA-2023-41f41fbb69",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/"
        },
        {
          "name": "FEDORA-2023-7c6c696102",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-50784",
    "datePublished": "2023-12-16T00:00:00",
    "dateReserved": "2023-12-14T00:00:00",
    "dateUpdated": "2024-08-02T22:23:43.649Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-13649 (GCVE-0-2017-13649)
Vulnerability from cvelistv5
Published
2017-08-23 21:00
Modified
2024-08-05 19:05
Severity ?
CWE
  • n/a
Summary
UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.
References
https://bugs.unrealircd.org/view.php?id=4990x_refsource_MISC
http://www.securityfocus.com/bid/100507vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:05:18.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.unrealircd.org/view.php?id=4990"
          },
          {
            "name": "100507",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100507"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-29T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.unrealircd.org/view.php?id=4990"
        },
        {
          "name": "100507",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100507"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-13649",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.unrealircd.org/view.php?id=4990",
              "refsource": "MISC",
              "url": "https://bugs.unrealircd.org/view.php?id=4990"
            },
            {
              "name": "100507",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100507"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-13649",
    "datePublished": "2017-08-23T21:00:00",
    "dateReserved": "2017-08-23T00:00:00",
    "dateUpdated": "2024-08-05T19:05:18.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-7144 (GCVE-0-2016-7144)
Vulnerability from cvelistv5
Published
2017-01-18 17:00
Modified
2024-08-06 01:50
Severity ?
CWE
  • n/a
Summary
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:50:47.578Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588"
          },
          {
            "name": "92763",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92763"
          },
          {
            "name": "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
          },
          {
            "name": "[oss-security] 20160904 CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-09-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-19T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588"
        },
        {
          "name": "92763",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92763"
        },
        {
          "name": "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
        },
        {
          "name": "[oss-security] 20160904 CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766",
              "refsource": "CONFIRM",
              "url": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766"
            },
            {
              "name": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588",
              "refsource": "CONFIRM",
              "url": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588"
            },
            {
              "name": "92763",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92763"
            },
            {
              "name": "[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
            },
            {
              "name": "[oss-security] 20160904 CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7144",
    "datePublished": "2017-01-18T17:00:00",
    "dateReserved": "2016-09-05T00:00:00",
    "dateUpdated": "2024-08-06T01:50:47.578Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4893 (GCVE-0-2009-4893)
Vulnerability from cvelistv5
Published
2010-06-15 01:00
Modified
2024-08-07 07:17
Severity ?
CWE
  • n/a
Summary
Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:17:25.906Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201006-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
          },
          {
            "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"
          },
          {
            "name": "42077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42077"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-10-28T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "GLSA-201006-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
        },
        {
          "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"
        },
        {
          "name": "42077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42077"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-4893",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201006-21",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
            },
            {
              "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"
            },
            {
              "name": "42077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42077"
            },
            {
              "name": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt",
              "refsource": "CONFIRM",
              "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-4893",
    "datePublished": "2010-06-15T01:00:00",
    "dateReserved": "2010-06-14T00:00:00",
    "dateUpdated": "2024-08-07T07:17:25.906Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7384 (GCVE-0-2013-7384)
Vulnerability from cvelistv5
Published
2014-05-19 14:00
Modified
2024-09-16 19:51
Severity ?
CWE
  • n/a
Summary
UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors, related to SSL. NOTE: this issue was SPLIT from CVE-2013-6413 per ADT2 due to different vulnerability types.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:16.926Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/379"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
          },
          {
            "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/383"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors, related to SSL.  NOTE: this issue was SPLIT from CVE-2013-6413 per ADT2 due to different vulnerability types."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-19T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/379"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
        },
        {
          "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/383"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7384",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors, related to SSL.  NOTE: this issue was SPLIT from CVE-2013-6413 per ADT2 due to different vulnerability types."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131129 CVE request: UnrealIRCd remote DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/379"
            },
            {
              "name": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221",
              "refsource": "CONFIRM",
              "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
            },
            {
              "name": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
            },
            {
              "name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/383"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7384",
    "datePublished": "2014-05-19T14:00:00Z",
    "dateReserved": "2014-05-19T00:00:00Z",
    "dateUpdated": "2024-09-16T19:51:20.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2075 (GCVE-0-2010-2075)
Vulnerability from cvelistv5
Published
2010-06-15 01:00
Modified
2024-08-07 02:17
Severity ?
CWE
  • n/a
Summary
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
References
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txtx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/1437vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-201006-21.xmlvendor-advisory, x_refsource_GENTOO
http://osvdb.org/65445vdb-entry, x_refsource_OSVDB
http://www.openwall.com/lists/oss-security/2010/06/14/11mailing-list, x_refsource_MLIST
http://www.exploit-db.com/exploits/13853exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/40169third-party-advisory, x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2010/Jun/277mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/bid/40820vdb-entry, x_refsource_BID
http://seclists.org/fulldisclosure/2010/Jun/284mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:17:13.638Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt"
          },
          {
            "name": "ADV-2010-1437",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1437"
          },
          {
            "name": "GLSA-201006-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
          },
          {
            "name": "65445",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/65445"
          },
          {
            "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/14/11"
          },
          {
            "name": "13853",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/13853"
          },
          {
            "name": "40169",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40169"
          },
          {
            "name": "20100612 Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2010/Jun/277"
          },
          {
            "name": "40820",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/40820"
          },
          {
            "name": "20100612 Re: Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2010/Jun/284"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-06-18T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt"
        },
        {
          "name": "ADV-2010-1437",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1437"
        },
        {
          "name": "GLSA-201006-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
        },
        {
          "name": "65445",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/65445"
        },
        {
          "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/14/11"
        },
        {
          "name": "13853",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/13853"
        },
        {
          "name": "40169",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40169"
        },
        {
          "name": "20100612 Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2010/Jun/277"
        },
        {
          "name": "40820",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/40820"
        },
        {
          "name": "20100612 Re: Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2010/Jun/284"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2010-2075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt",
              "refsource": "CONFIRM",
              "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt"
            },
            {
              "name": "ADV-2010-1437",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1437"
            },
            {
              "name": "GLSA-201006-21",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
            },
            {
              "name": "65445",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/65445"
            },
            {
              "name": "[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/14/11"
            },
            {
              "name": "13853",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/13853"
            },
            {
              "name": "40169",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40169"
            },
            {
              "name": "20100612 Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2010/Jun/277"
            },
            {
              "name": "40820",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/40820"
            },
            {
              "name": "20100612 Re: Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2010/Jun/284"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2075",
    "datePublished": "2010-06-15T01:00:00",
    "dateReserved": "2010-05-25T00:00:00",
    "dateUpdated": "2024-08-07T02:17:13.638Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2017-01-18 17:59
Modified
2025-04-20 01:37
Summary
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36F4B9A-FE00-4254-AE01-988C5E3563DC",
              "versionEndIncluding": "3.2.10.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEACFAE-0672-465C-B36A-2511CD8F7D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ABEC11-ACFD-49CD-BA6A-041EAE20FCCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E776FF2-D9CC-468E-9505-8BAA042B070A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C6CA34-F564-4F19-AADB-D54595BA3BE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A89C6801-3E03-426E-A034-1DBC06998F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C229E849-C99A-48C3-A00A-67A714904F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB89D241-E224-45B9-8B77-B5FA3C955099",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n m_authenticate en modules/m_sasl.c en UnrealIRCd en versiones anteriores a 3.2.10.7 y 4.x en versiones anteriores a 4.0.6 permite a atacantes remotos suplantar huellas dactilares de certificados y consecuentemente iniciar sesi\u00f3n como otro usuario a trav\u00e9s de un par\u00e1metro AUTHENTICATE manipulado."
    }
  ],
  "id": "CVE-2016-7144",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-18T17:59:00.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92763"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/04/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/09/05/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://forums.unrealircd.org/viewtopic.php?f=1\u0026t=8588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-19 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors, related to SSL. NOTE: this issue was SPLIT from CVE-2013-6413 per ADT2 due to different vulnerability types.
Impacted products
Vendor Product Version
unrealircd unrealircd 3.2.10
unrealircd unrealircd 3.2.10.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDFB2BC-E10C-4F8A-829E-F63F9146EF73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6AD81-3B0C-4205-A91B-734E78B88457",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors, related to SSL.  NOTE: this issue was SPLIT from CVE-2013-6413 per ADT2 due to different vulnerability types."
    },
    {
      "lang": "es",
      "value": "UnrealIRCd 3.2.10 anterior a 3.2.10.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia en puntero nulo y ca\u00edda) a trav\u00e9s de vectores no especificados, relacionado con SSL. NOTA: este problema fue dividido (SPLIT) de CVE-2013-6413 por ADT2 debido a tipos diferentes de vulnerabilidad."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"",
  "id": "CVE-2013-7384",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-19T14:55:10.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/oss-sec/2013/q4/379"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/oss-sec/2013/q4/383"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-16 23:15
Modified
2024-11-21 08:37
Summary
A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms.
Impacted products
Vendor Product Version
unrealircd unrealircd *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "574ACE08-97D7-4495-BF19-0F2EA0631ECA",
              "versionEndExcluding": "6.1.4",
              "versionStartIncluding": "6.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en websockets en UnrealIRCd 6.1.0 hasta 6.1.3 anterior a 6.1.4 permite que un atacante remoto no autenticado bloquee el servidor enviando un paquete de gran tama\u00f1o (si un puerto websocket est\u00e1 abierto). La ejecuci\u00f3n remota de c\u00f3digo podr\u00eda ser posible en algunas plataformas antiguas y poco comunes."
    }
  ],
  "id": "CVE-2023-50784",
  "lastModified": "2024-11-21T08:37:18.633",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-16T23:15:40.770",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://forums.unrealircd.org/viewtopic.php?t=9340"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.unrealircd.org/index/news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://forums.unrealircd.org/viewtopic.php?t=9340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.unrealircd.org/index/news"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-08-23 21:29
Modified
2025-04-20 01:37
Summary
UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command.
Impacted products
Vendor Product Version
unrealircd unrealircd *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "820D68EC-4DF4-4050-8BB5-996690483267",
              "versionEndIncluding": "4.0.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "UnrealIRCd 4.0.13 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command. NOTE: the vendor indicates that there is no common or recommended scenario in which a root script would execute this kill command."
    },
    {
      "lang": "es",
      "value": "UnrealIRCd 4.0.13 y anteriores crea un archivo PID tras eliminar privilegios a una cuenta no-root, lo que podr\u00eda permitir que usuarios locales terminen procesos arbitrarios aprovechando el acceso a esta cuenta no-root para modificar PID antes de que un script root ejecute un comando \"kill `cat /pathname`\". NOTA: El proveedor indica que no existe un escenario com\u00fan o recomendado en el que un script root ejecutar\u00eda este comando kill."
    }
  ],
  "id": "CVE-2017-13649",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-08-23T21:29:00.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100507"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.unrealircd.org/view.php?id=4990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.unrealircd.org/view.php?id=4990"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-19 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7384 was assigned for the NULL pointer dereference.
Impacted products
Vendor Product Version
unrealircd unrealircd 3.2.10
unrealircd unrealircd 3.2.10.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDFB2BC-E10C-4F8A-829E-F63F9146EF73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6AD81-3B0C-4205-A91B-734E78B88457",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in UnrealIRCd 3.2.10 before 3.2.10.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.  NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7384 was assigned for the NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en UnrealIRCd 3.2.10 anterior a 3.2.10.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores no especificados. NOTA: este identificador fue dividido (SPLIT) por ADT2 debido a tipos diferentes de vulnerabilidad. CVE-2013-7384 fue asignado para la referencia en puntero nulo."
    }
  ],
  "id": "CVE-2013-6413",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-19T14:55:09.017",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q4/379"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q4/383"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://forums.unrealircd.com/viewtopic.php?f=2\u0026t=8221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-15 14:04
Modified
2025-04-11 00:51
Severity ?
Summary
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
References
secalert@redhat.comhttp://osvdb.org/65445
secalert@redhat.comhttp://seclists.org/fulldisclosure/2010/Jun/277
secalert@redhat.comhttp://seclists.org/fulldisclosure/2010/Jun/284
secalert@redhat.comhttp://secunia.com/advisories/40169Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201006-21.xml
secalert@redhat.comhttp://www.exploit-db.com/exploits/13853
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/06/14/11
secalert@redhat.comhttp://www.securityfocus.com/bid/40820Exploit
secalert@redhat.comhttp://www.unrealircd.com/txt/unrealsecadvisory.20100612.txtVendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1437Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/65445
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2010/Jun/277
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2010/Jun/284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40169Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201006-21.xml
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/13853
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/06/14/11
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40820Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1437Vendor Advisory
Impacted products
Vendor Product Version
unrealircd unrealircd 3.2.8.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C4474E-516D-4938-A148-42E16FE589DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands."
    },
    {
      "lang": "es",
      "value": "Versiones de UnrealIRCd v3.2.8.1, distribuidas en ciertos sitios espejo (mirrors) desde Noviembre de 2009 hasta Junio de 2010 contienen una modificaci\u00f3n introducida externamente (Caballo de Troya)en la macro DEBUG3_DOLOG_SYSTEM, que permite a atacantes remotos ejecutar comandos de su elecci\u00f3n."
    }
  ],
  "evaluatorComment": "Per: http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt\r\n\r\n\u0027Official precompiled Windows binaries (SSL and non-ssl) are NOT affected.\r\n\r\nCVS is also not affected.\r\n\r\n3.2.8 and any earlier versions are not affected.\r\n\r\nAny Unreal3.2.8.1.tar.gz downloaded BEFORE November 10 2009 should be safe, but you should really double-check, see next.\u0027",
  "id": "CVE-2010-2075",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-15T14:04:26.327",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/65445"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2010/Jun/277"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2010/Jun/284"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40169"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.exploit-db.com/exploits/13853"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/14/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40820"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/65445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2010/Jun/277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2010/Jun/284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/13853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/14/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1437"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-15 14:04
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "BA73C6B3-F7F1-4907-B396-4D208A44CF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2185F2F0-1791-43A8-BDCF-6A0C88EC9747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "C7D99A6A-E9C6-4F24-9A42-8DDD90356940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "E08A61AB-D7B7-4CE8-90DD-955DAE660050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F921EE-278D-4608-8F0E-97F6A8F08468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.2:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "DE98C6FE-5195-4A03-A6A7-0F3AA39A5132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E29F2-8EEE-4F50-A64B-57BF51193780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "8C8D661C-B09E-4615-9858-A0FFAA500C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "B9279F94-5159-41B0-99DF-A389910E7C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "243E88AF-2178-42B3-A563-76C23EDD1278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre4:*:*:*:*:*:*",
              "matchCriteriaId": "D7112386-BE35-45A8-813B-03D7D6495958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D9F64A-CBB8-4B49-BC09-F0B267C98EE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "A7BDC698-18A0-4F1E-92B0-7E7D1D2F80AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "3E482F0F-E98E-4D2A-822F-08C372A7FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2B6D6A15-60EA-4B27-87AA-197F014F6CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "635EC169-C8C8-4C52-84BC-48765DC375A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2EEA8E08-215E-47CA-9074-A59098CB5EE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "744421B9-961E-423B-BB86-60F23D88F5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6FAB49F5-D94B-47CF-B810-B7FBAD8ADFAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2EF31F4C-13A3-4585-A737-7F1E95A4F2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8F908926-F2DF-4DA1-B67D-33D6ED0F3685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F8A053-9596-4D33-A27E-D94E67618938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9CD5E4B-0C96-4BEE-A590-1419565BB89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "918C2949-60CC-4BD7-871E-A2C0909C4520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9644D-A12B-40C8-9673-83F0EE07898F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB21BA6-DC3D-47C7-8969-F3B4BB0EF964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "940628BB-42FA-48E8-BB60-C0483C4EE77D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E4258FC4-1D85-44BF-85DF-DFACE704D358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCCF5D1-EDA5-4793-BBDD-39D89248D97B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AD0B364F-FC24-4F3A-874A-8235AC99A3BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C2218-D20D-402A-BA75-A2063FC80163",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en UnrealIRCd 3.2beta11 a 3.2.8, cuando allow::options::noident est\u00e1 habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados."
    }
  ],
  "id": "CVE-2009-4893",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-15T14:04:26.233",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/42077"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}