Korean
<< Back
VID 23104
Severity 40
Port 6667
Protocol TCP
Class IRCD
Detailed Description The relevant host is running a version of ngIRCd which is older than 0.8.2. ngIRCd is a free open source daemon for Internet Relay Chat (IRC), developed under the GNU General Public License. ngIRCd versions prior to 0.8.2 are vulnerable to a buffer overflow in the way the server handle list names. A remote attacker could exploit this vulnerability by using a malicious user information. A successful attack may allow the attacker to crash the server or gain unauthorized access to a vulnerable computer.

* Note: This check solely relied on the version number of the remote IRC daemon to assess this vulnerability, so this might be a false positive.

* Platforms Affected:
alex, ngIRCd versions prior to 0.8.2
Any operating system Any version
Recommendation Upgrade to the latest version of ngIRCd (0.8.3 or later), available from the ngIRCd Web site at http://arthur.ath.cx/~alex/ngircd/

For Gentoo Linux:
Upgrade to the latest version of ngircd (0.8.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200501-40 at http://www.gentoo.org/security/en/glsa/glsa-200501-40.xml
Related URL CVE-2005-0199 (CVE)
Related URL 12397 (SecurityFocus)
Related URL 19143 (ISS)