[manjaro-security] [arch-security] [ASA-201707-13] irssi: multiple issues

Remi Gacogne rgacogne at archlinux.org
Thu Jul 13 13:47:12 CEST 2017

Arch Linux Security Advisory ASA-201707-13

Severity: Critical
Date    : 2017-07-13
CVE-ID  : CVE-2017-10965 CVE-2017-10966
Package : irssi
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-342


The package irssi before version 1.0.4-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.


Upgrade to 1.0.4-1.

# pacman -Syu "irssi>=1.0.4-1"

The problems have been fixed upstream in version 1.0.4.




- CVE-2017-10965 (denial of service)

When receiving messages with invalid time stamps, Irssi would try to
dereference a NULL pointer. This requires control over the IRC server,
or a position of man-in-the-middle to be exploited.

- CVE-2017-10966 (arbitrary code execution)

While updating the internal nick list, Irssi may incorrectly use the
GHashTable interface and free the nick while updating it. This will
then result in use-after-free conditions on each access of the hash
table. Note that this should not happen with a conforming IRC server,
so it requires control over the IRC server or a position of man-in-the-
middle to be exploitable.


A remote attacker in position of man-in-the-middle or controlling the
IRC server might be able to crash or execute arbitrary code on an
affected host.



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170713/75f1d549/attachment.sig>

More information about the manjaro-security mailing list