Vulnerabilities > CVE-2006-6811 - Reachable Assertion vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
KsIRC 1.3.12 allows remote attackers to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference. NOTE: this issue was originally reported as a buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 3 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | KsIRC 1.3.12 (PRIVMSG) Remote Buffer Overflow PoC. CVE-2006-6811. Dos exploit for linux platform |
file | exploits/linux/dos/3023.c |
id | EDB-ID:3023 |
last seen | 2016-01-31 |
modified | 2006-12-26 |
platform | linux |
port | |
published | 2006-12-26 |
reporter | Federico L. Bossi Bonin |
source | https://www.exploit-db.com/download/3023/ |
title | KsIRC 1.3.12 - PRIVMSG Remote Buffer Overflow PoC |
type | dos |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200701-26.NASL description The remote host is affected by the vulnerability described in GLSA-200701-26 (KSirc: Denial of Service vulnerability) KSirc fails to check the size of an incoming PRIVMSG string sent from an IRC server during the connection process. Impact : A malicious IRC server could send a long PRIVMSG string to the KSirc client causing an assertion failure and the dereferencing of a null pointer, resulting in a crash. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 24311 published 2007-02-09 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24311 title GLSA-200701-26 : KSirc: Denial of Service vulnerability NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-409-1.NASL description Federico L. Bossi Bonin discovered a Denial of Service vulnerability in ksirc. By sending a special response packet, a malicious IRC server could crash ksirc. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 27997 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/27997 title Ubuntu 5.10 / 6.06 LTS / 6.10 : kdenetwork vulnerability (USN-409-1) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-009.NASL description KsIRC 1.3.12 allows remote attackers to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference. Updated packages are patched to address this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 24625 published 2007-02-18 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24625 title Mandrake Linux Security Advisory : kdenetwork (MDKSA-2007:009)
Statements
contributor | Mark J Cox |
lastmodified | 2007-01-18 |
organization | Red Hat |
statement | We do not consider a crash of a client application such as KsIRC to be a security issue. |
References
- http://www.securityfocus.com/bid/21790
- http://www.addict3d.org/index.php?page=viewarticle&trace=0&type=security&ID=8468
- http://securitytracker.com/id?1017453
- http://www.kde.org/info/security/advisory-20070109-1.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:009
- http://www.ubuntu.com/usn/usn-409-1
- https://issues.rpath.com/browse/RPL-922
- http://security.gentoo.org/glsa/glsa-200701-26.xml
- http://osvdb.org/33443
- http://www.vupen.com/english/advisories/2006/5199
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31134
- https://www.exploit-db.com/exploits/3023
- http://www.securityfocus.com/archive/1/456379/100/0/threaded