--- - name: Historic bugs: - cve: CVE-2002-0983 exploitable_by: client affected_versions: from: '*' to: 0.8.4 fixed_version: 0.8.6 git_commit: b9b0917897bd3b78d105c3229deb390daa204cdd credit: ripe@7a69ezine.org description: | Denial of service (crash) via an IRC channel that has a long topic followed by a certain string, possibly triggering a buffer overflow. - cve: CVE-2002-1840 exploitable_by: remote important: True affected_versions: from: 0.8.4 to: 0.8.4 affected_note_bottom: 'downloaded after 2002-03-14' description: | The download server was compromised and the download was backdoored, which allows remote attackers to access the system. Always check the GPG signature! - name: 0.8.9 issues release_date: 2003-12-11 bugs: - cve: CVE-2003-1020 exploitable_by: client affected_versions: from: '*' to: 0.8.8 fixed_version: 0.8.9 git_commit: ae7f177fb0ac0732239d3ff1b8dd208a31a7354d credit: Rico Gloeckner description: | The format_send_to_gui function allows remote IRC users to cause a denial of service (crash). - name: 0.8.10 issues release_date: 2006-03-01 bugs: - cve: CVE-2006-0458 exploitable_by: client affected_versions: from: 0.8.9+ to: 0.8.9+ fixed_version: 0.8.10 git_commit: 6d42a00287ff144c5c597b5da158961e0c22847d description: | The DCC ACCEPT command handler allows remote attackers to cause a denial of service (application crash) via certain crafted arguments in a DCC command. - name: 0.8.11 issues release_date: 2007-08-12 bugs: - cve: CVE-2007-4396 exploitable_by: local (remote) affected_versions: from: '*' to: 0.8.10 fixed_version: 0.8.11 git_commit: f0fb4c19d45e25fddee76e7c442b1e900666cd0c credit: 'Wouter Coekaerts' description: | Multiple CRLF injection vulnerabilities in several scripts for Irssi allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences. - name: 0.8.14 issues release_date: 2009-05-28 bugs: - cve: CVE-2009-1959 exploitable_by: client affected_versions: from: '*' to: 0.8.13 fixed_version: 0.8.14 git_commit: 1f9c560a7408bf5550e030b5ac0c07dad5435eb1 credit: nemo@felinemenace.org description: | Off-by-one error in the event_wallops function allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow. - name: 0.8.15 issues release_date: 2010-04-03 bugs: - cve: CVE-2010-1155 affected_versions: from: '*' to: 0.8.14 fixed_version: 0.8.15 git_commit: bb4ce4562bd04eeb24a5953dd8da5c843c04e328 description: | Irssi does not verify that the server hostname matches a domain name in the SSL certificate. - cve: CVE-2010-1156 exploitable_by: client affected_versions: from: '*' to: 0.8.14 fixed_version: 0.8.15 git_commit: 1aa10ece887afd5d64eca1211aeced6cab310680 credit: 'Aurelien Delaitre (SATE 2009)' description: | core/nicklist.c in Irssi allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel. - name: IRSSI-SA-2016 release_date: 2016-09-14 git_commit: 295a4b77f07f14602eeaa371f00ddbf09910c82b bugs: - cve: CVE-2016-7044 exploitable_by: client important: True affected_versions: from: 0.8.17 to: 0.8.19 affected_note_bottom: '(with truecolor)' fixed_version: 0.8.20 credit: 'Gabriel Campana and Adrien Guinet from Quarkslab' description: 'Remote crash and heap corruption in format parsing code' - cve: CVE-2016-7045 exploitable_by: client important: True affected_versions: from: 0.8.17 to: 0.8.19 fixed_version: 0.8.20 credit: 'Gabriel Campana and Adrien Guinet from Quarkslab' description: 'Remote crash and heap corruption in format parsing code' - name: BUF-PL-SA-2016 affected_note: buf.pl release_date: 2016-09-09 git_commit: f1b1eb154baa684fad5d65bf4dff79c8ded8b65a repo: scripts.irssi.org bugs: - cve: CVE-2016-7553 exploitable_by: local affected_versions: from: '*' to: '2.13' fixed_version: '2.20' credit: 'Juerd Waalboer' description: 'Information disclosure vulnerability' - name: IRSSI-SA-2017-01 release_date: 2017-01-05 git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d bugs: - cve: CVE-2017-5193 exploitable_by: server affected_versions: from: '*' to: 0.8.20 fixed_version: 0.8.21 credit: 'Joseph Bisch' description: 'NULL pointer dereference in the nickcmp function' - cve: CVE-2017-5194 exploitable_by: server affected_versions: from: '*' to: 0.8.20 fixed_version: 0.8.21 credit: ~ description: 'Use after free when receiving invalid nick message' - cve: CVE-2017-5356 exploitable_by: formats affected_versions: from: '*' to: 0.8.20 fixed_version: 0.8.21 credit: 'Hanno Böck' description: 'Out of bounds read when printing the value %[' - cve: CVE-2017-5195 exploitable_by: client affected_versions: from: 0.8.17 to: 0.8.20 fixed_version: 0.8.21 credit: 'Joseph Bisch' description: 'Out of bounds read in certain incomplete control codes' - cve: CVE-2017-5196 exploitable_by: server affected_versions: from: 0.8.18 to: 0.8.20 fixed_version: 0.8.21 credit: 'Hanno Böck and independently by Joseph Bisch' description: 'Out of bounds read in certain incomplete character sequences' - name: Bulletin release_date: 2017-02-05 link: http://www.openwall.com/lists/oss-security/2017/02/05/8 bugs: - name: '(a)' exploitable_by: server affected_versions: from: 1.0.0 to: 1.0.0 fixed_version: 1.0.1 credit: 'Joseph Bisch' description: 'Memory leak in some cases where a hostile server would send certain incomplete SASL replies' git_commit: 19c51789967a2f63da033e60f6ef08848b9cd144 - name: '(b)' exploitable_by: '-' affected_versions: from: '*' to: 1.0.0 fixed_version: 1.0.1 credit: 'Hanno Böck' description: 'Missing NULL sentinel when initialising the Perl interpreter' git_commit: 1f42d2aa950e4d70bf4c4aebae3a7040bd710cf3 - name: IRSSI-SA-2017-03 release_date: 2017-03-10 git_commit: 77b2631c78461965bc9a7414aae206b5c514e1b3 bugs: - cve: CVE-2017-7191 exploitable_by: server important: True affected_versions: from: 1.0.0 to: 1.0.1 fixed_version: 1.0.2 credit: APic description: 'Use after free while producing list of netjoins' - name: IRSSI-SA-2017-06 release_date: 2017-06-06 git_commit: fb08fc7f1aa6b2e616413d003bf021612301ad55 bugs: - cve: CVE-2017-9468 exploitable_by: server affected_versions: from: '*' to: 1.0.2 fixed_version: 1.0.3 credit: 'Joseph Bisch' description: 'NULL pointer dereference when receiving a DCC message without source nick/host' - cve: CVE-2017-9469 exploitable_by: client affected_versions: from: '*' to: 1.0.2 fixed_version: 1.0.3 credit: 'Joseph Bisch' description: 'Out of bounds read when parsing incorrectly quoted DCC files'