Korean
<< Back
VID 23105
Severity 40
Port 6667
Protocol TCP
Class IRCD
Detailed Description The relevant host is running a version of ngIRCd which is older than 0.8.3. ngIRCd is a free open source daemon for Internet Relay Chat (IRC), developed under the GNU General Public License. ngIRCd versions prior to 0.8.3 are vulnerable to a format string vulnerability in the Log_Resolver function when parsing arguments to the syslog function. A remote attacker could exploit this vulnerability by using a malicious user information. A successful attack may allow the attacker to crash the server or gain unauthorized access to a vulnerable computer.

* Note: This check solely relied on the version number of the remote IRC daemon to assess this vulnerability, so this might be a false positive.

* References:
http://arthur.ath.cx/~alex/ngircd/
http://www.nosystem.com.ar/advisories/advisory-11.txt
http://packetstormsecurity.nl/0502-advisories/nsg-advisory-11.txt

* Platforms Affected:
alex, ngIRCd versions prior to 0.8.3
Any operating system Any version
Recommendation Apply the patch for this vulnerability, available from the No System Group - Advisory #11 dated 03/02/05 at http://www.nosystem.com.ar/advisories/advisory-11.txt

-- OR --

Upgrade to the latest version of ngIRCd (0.8.3 or later), available from the ngIRCd Web site at http://arthur.ath.cx/~alex/ngircd/
Related URL CVE-2005-0226 (CVE)
Related URL 12434 (SecurityFocus)
Related URL 19204 (ISS)