| VID |
23104 |
| Severity |
40 |
| Port |
6667 |
| Protocol |
TCP |
| Class |
IRCD |
| Detailed Description |
The relevant host is running a version of ngIRCd which is older than 0.8.2. ngIRCd is a free open source daemon for Internet Relay Chat (IRC), developed under the GNU General Public License. ngIRCd versions prior to 0.8.2 are vulnerable to a buffer overflow in the way the server handle list names. A remote attacker could exploit this vulnerability by using a malicious user information. A successful attack may allow the attacker to crash the server or gain unauthorized access to a vulnerable computer.
* Note: This check solely relied on the version number of the remote IRC daemon to assess this vulnerability, so this might be a false positive.
* Platforms Affected: alex, ngIRCd versions prior to 0.8.2 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of ngIRCd (0.8.3 or later), available from the ngIRCd Web site at http://arthur.ath.cx/~alex/ngircd/
For Gentoo Linux: Upgrade to the latest version of ngircd (0.8.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200501-40 at http://www.gentoo.org/security/en/glsa/glsa-200501-40.xml |
| Related URL |
CVE-2005-0199 (CVE) |
| Related URL |
12397 (SecurityFocus) |
| Related URL |
19143 (ISS) |
|