| VID |
23105 |
| Severity |
40 |
| Port |
6667 |
| Protocol |
TCP |
| Class |
IRCD |
| Detailed Description |
The relevant host is running a version of ngIRCd which is older than 0.8.3. ngIRCd is a free open source daemon for Internet Relay Chat (IRC), developed under the GNU General Public License. ngIRCd versions prior to 0.8.3 are vulnerable to a format string vulnerability in the Log_Resolver function when parsing arguments to the syslog function. A remote attacker could exploit this vulnerability by using a malicious user information. A successful attack may allow the attacker to crash the server or gain unauthorized access to a vulnerable computer.
* Note: This check solely relied on the version number of the remote IRC daemon to assess this vulnerability, so this might be a false positive.
* References: http://arthur.ath.cx/~alex/ngircd/ http://www.nosystem.com.ar/advisories/advisory-11.txt http://packetstormsecurity.nl/0502-advisories/nsg-advisory-11.txt
* Platforms Affected: alex, ngIRCd versions prior to 0.8.3 Any operating system Any version |
| Recommendation |
Apply the patch for this vulnerability, available from the No System Group - Advisory #11 dated 03/02/05 at http://www.nosystem.com.ar/advisories/advisory-11.txt
-- OR --
Upgrade to the latest version of ngIRCd (0.8.3 or later), available from the ngIRCd Web site at http://arthur.ath.cx/~alex/ngircd/ |
| Related URL |
CVE-2005-0226 (CVE) |
| Related URL |
12434 (SecurityFocus) |
| Related URL |
19204 (ISS) |
|