blob: 44391f2109db1e9ed3ecb6a9aa76799a1344067c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
|
---
layout: page
title: Security
permalink: security/
categories: [ _nav ]
---
<table class="table">
<thead>
<tr class="text-nowrap">
<th colspan="2">Links</th>
<th>Exploitable</th>
<th colspan="3">Versions affected</th>
<th>Fixed</th>
<th>Credit</th>
<th colspan="2">Description</th>
</tr>
</thead>
{% assign advisories = site.data.security %}
{% for advisory in advisories reversed %}
<tbody>
<tr>
<th colspan="3">{% if advisory.link %}<a href="{{ advisory.link }}">{{ advisory.name }}</a>{% elsif advisory.name contains "-SA-" %}<a href="{{ site.baseurl }}/security/{{ advisory.name | slugify | replace: '-', '_' }}.txt">{{ advisory.name }}</a>{% else %}{{ advisory.name }}{% endif %}</th>
<th colspan="3">{% if advisory.affected_note %}{{ advisory.affected_note }}{% endif %}</th>
<th>{% if advisory.git_commit %}<a href="https://github.com/irssi/{% if advisory.repo %}{{ advisory.repo }}{% else %}irssi{% endif %}/commit/{{ advisory.git_commit }}">{{ advisory.release_date }}</a>{% else %}{{ advisory.release_date }}{% endif %}</th>
<th colspan="3"></th>
</tr>
</tbody>
<tbody>
{% for bug in advisory.bugs %}
<tr>
<td rowspan="3"></td>
<td rowspan="3" class="text-nowrap">
{% if bug.name %}
<div>{% if bug.link %}<a href="{{ bug.link }}">{{ bug.name }}</a>{% else %}{{ bug.name }}{% endif %}</div>
{% endif %}
{% if bug.cve %}
<div><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name={{ bug.cve }}">{{ bug.cve }}</a></div>
{% endif %}
{% for link in bug.external_links %}
<div><a href="{{ link.url }}">{{ link.id }}</a></div>
{% endfor %}
</td>
<td rowspan="3">{{ bug.exploitable_by }}</td>
{% if bug.affected_note_top %}<td class="has-next-row" colspan="4">{{ bug.affected_note_top }}</td>{% else %}
<td class="has-next-row">{% if bug.affected_versions.from %}{{ bug.affected_versions.from }}{% else %}*{% endif %}</td>
<td class="has-next-row">{% if bug.affected_versions.to %}–{% endif %}</td>
<td class="has-next-row">{{ bug.affected_versions.to }}</td>
<td class="has-next-row">
{% if bug.git_commit %}<a href="https://github.com/irssi/{% if bug.repo %}{{ bug.repo }}{% else %}irssi{% endif %}/commit/{{ bug.git_commit }}">{{ bug.fixed_version }}</a>{% else %}{{ bug.fixed_version }}{% endif %}
</td>
{% endif %}
<td rowspan="3">{{ bug.credit }}</td>
<td rowspan="3">{{ bug.description }}</td>
<td rowspan="3"></td>
</tr>
<tr>
{% if bug.affected_note_top %}
<td class="has-next-row has-previous-row">{% if bug.affected_versions.from %}{{ bug.affected_versions.from }}{% else %}*{% endif %}</td>
<td class="has-next-row has-previous-row">{% if bug.affected_versions.to %}–{% endif %}</td>
<td class="has-next-row has-previous-row">{{ bug.affected_versions.to }}</td>
<td class="has-next-row has-previous-row">
{% if bug.git_commit %}<a href="https://github.com/irssi/{% if bug.repo %}{{ bug.repo }}{% else %}irssi{% endif %}/commit/{{ bug.git_commit }}">{{ bug.fixed_version }}</a>{% else %}{{ bug.fixed_version }}{% endif %}
</td>
{% else %}
<td class="has-previous-row" colspan="3" rowspan="2">{% if bug.affected_note_bottom %}{{ bug.affected_note_bottom }}{% endif %}</td>
<td class="has-previous-row" rowspan="2"></td>
{% endif %}
</tr>
<tr>
{% if bug.affected_note_top %}
<td class="has-previous-row" colspan="3">{% if bug.affected_note_bottom %}{{ bug.affected_note_bottom }}{% endif %}</td>
<td class="has-previous-row"></td>
{% endif %}
</tr>
{% endfor %}
</tbody>
{% endfor %}
</tbody>
</table>
<h2>Reference</h2>
<p>"Exploitable by" column:</p>
<ul>
<li>
<b>Server</b>: Triggered by malicious inputs sent by a server with complete control over the connection<br />
Example: malformed raw IRC commands
</li>
<li>
<b>Client</b>: Triggered by malicious inputs sent by remote clients with no privileges over the network<br />
Example: malformed color codes inside a message
</li>
<li>
<b>Local</b>: Exploitable by unprivileged system users with access to the same filesystem<br />
Example: CVE-2016-7553 (buf.pl information disclosure)
</li>
<li>
<b>Formats</b>: Exploitable through internal format codes used in themes and configs. These are not normally processed from the network but may be in combination with buggy scripts.<br />
Example: CVE-2017-5356 (Crash on <code>%[</code>)
</li>
</ul>
|