Your submission was sent successfully! Close

CVE-2016-7045

Published: 21 September 2016

The format_send_to_gui function in the format parsing code in Irssi before 0.8.20 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.

From the Ubuntu security team

Gabriel Campana and Adrien Guinet discovered that a buffer overflow existed in the format parsing code in Irssi. A remote attacker could use this to cause a denial of service (application crash).

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
irssi
Launchpad, Ubuntu, Debian
precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream
Released (0.8.20)
xenial
Released (0.8.19-1ubuntu1.2)