Vulnerabilities > CVE-2004-1052 - Buffer Overflow vulnerability in BNC getnickuserhost IRC Server Response

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
bnc
debian
gentoo
critical
nessus

Summary

Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-595.NASL
    descriptionLeon Juranic discovered that BNC, an IRC session bouncing proxy, does not always protect buffers from being overwritten. This could exploited by a malicious IRC server to overflow a buffer of limited size and execute arbitrary code on the client host.
    last seen2020-06-01
    modified2020-06-02
    plugin id15824
    published2004-11-24
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15824
    titleDebian DSA-595-1 : bnc - buffer overflow
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_9BE819C6463311D9A9E70001020EED82.NASL
    descriptionA LSS Security Advisory reports : There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC is processing response from IRC server. Vulnerability can be exploited if attacker tricks user to connect to his fake IRC server that will exploit this vulnerability. If the attacker has access to BNC proxy server, this vulnerability can be used to gain shell access on machine where BNC proxy server is set.
    last seen2020-06-01
    modified2020-06-02
    plugin id19048
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19048
    titleFreeBSD : bnc -- remotely exploitable buffer overflow in getnickuserhost (9be819c6-4633-11d9-a9e7-0001020eed82)