fkie_cve-2010-1156
Vulnerability from fkie_nvd
Published
2010-04-16 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.
References
secalert@redhat.comhttp://irssi.org/news
secalert@redhat.comhttp://irssi.org/news/ChangeLog
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
secalert@redhat.comhttp://marc.info/?l=oss-security&m=127098845125270&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=127110132019166&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=127111071631857&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=127115784314970&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=127119240204394&w=2
secalert@redhat.comhttp://secunia.com/advisories/39365Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/39620
secalert@redhat.comhttp://secunia.com/advisories/39797
secalert@redhat.comhttp://securitytracker.com/id?1023845
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
secalert@redhat.comhttp://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi&r1=4922&r2=5126
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-929-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0856Patch, Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0987
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1107
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1110
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/57791
af854a3a-2127-422b-91ae-364da2661108http://irssi.org/news
af854a3a-2127-422b-91ae-364da2661108http://irssi.org/news/ChangeLog
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=127098845125270&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=127110132019166&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=127111071631857&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=127115784314970&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=127119240204394&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39365Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39620
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39797
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023845
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
af854a3a-2127-422b-91ae-364da2661108http://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi&r1=4922&r2=5126
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-929-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0856Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0987
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1110
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/57791
Impacted products
Vendor Product Version
irssi irssi *
irssi irssi 0.8.0
irssi irssi 0.8.1
irssi irssi 0.8.2
irssi irssi 0.8.3
irssi irssi 0.8.4
irssi irssi 0.8.5
irssi irssi 0.8.6
irssi irssi 0.8.7
irssi irssi 0.8.8
irssi irssi 0.8.9
irssi irssi 0.8.10
irssi irssi 0.8.10
irssi irssi 0.8.10
irssi irssi 0.8.10
irssi irssi 0.8.10
irssi irssi 0.8.11
irssi irssi 0.8.11
irssi irssi 0.8.11
irssi irssi 0.8.12
irssi irssi 0.8.12
irssi irssi 0.8.13
irssi irssi 0.8.13
irssi irssi 0.8.14



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:irssi:irssi:*:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B25DF08F-FC05-4EC0-BBA2-6575F312DD8B",
              "versionEndIncluding": "0.8.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "986E338F-D640-4874-9A5F-CEF1F9CE8ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC7D751E-3083-489B-88D7-01316FA474DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD04D75-0FB2-46A4-943F-C6D225E1EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D72FE63-DAE4-4297-88BA-190594604307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC775325-9EA0-4E13-A03A-BD315E10C056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D6B8D2-CAE3-4001-BF92-933417E43F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "396BCD07-520E-4FE8-8F83-DDE8F4B2D036",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1732D0-2E71-4FDE-B528-3A9B6BEAA9DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "573668C9-CFBC-4B8E-885F-F2C5533304F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0631BD85-D548-417C-8977-2C3CF06DBEDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "356E844D-D076-4FC7-B6A0-AB0F1927B009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.10:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "6D607284-5737-47E9-9037-B62467E348BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.10:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "52FD7686-E4CE-48D9-ABEE-5973CFF8333E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.10:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "85BDCC58-FC6E-432B-9E04-DCEF7527F3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.10:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "BC60C00F-7FE1-4115-B45D-F0916AC663C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE96247-99B1-452F-B099-FC8C42E75051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "90AE0D8E-FE84-4AE5-A070-10419E3FC850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.11:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DB9950D5-3B0F-4A97-9164-15E84A3EF2D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F1FACC-F8CC-4757-A39C-C8752BA32928",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F0738365-71F2-4F99-BAD0-8427E9D2F922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FFA993F-4826-4937-B51D-438CFF4E08EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E94034DE-085E-4F8A-AC4C-ACD0FCF14C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:irssi:irssi:0.8.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E31CBB-A71A-4C3B-95CF-D393ADC91FE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel."
    },
    {
      "lang": "es",
      "value": "core/nicklist.c en Irssi anterior v0.8.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia a puntero NULL ca\u00edda de programa) a trav\u00e9s de  vectores relacionados con un nick fuzzy en el instante que la v\u00edctima abandona el canal."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027NULL Pointer Dereference\u0027\r\n\r\n",
  "id": "CVE-2010-1156",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-16T19:30:00.397",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://irssi.org/news"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://irssi.org/news/ChangeLog"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127098845125270\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127110132019166\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127111071631857\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127115784314970\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127119240204394\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39365"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/39620"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/39797"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1023845"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.497301"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi\u0026r1=4922\u0026r2=5126"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-929-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0856"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/0987"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1110"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://irssi.org/news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://irssi.org/news/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127098845125270\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127110132019166\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127111071631857\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127115784314970\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127119240204394\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023845"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.497301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi\u0026r1=4922\u0026r2=5126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-929-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57791"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…