How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote IRC server is affected by a denial of service attack.
The remote host is running a version of ircd which is vulnerable
to a rate-limiting Denial of Service (DoS) attack. The flaw is
in the fact that the IRCD daemon reserves more than 500 bytes of
memory for each line received.
An attacker, exploiting this flaw, would need network access to the
IRC server. A successful attack would render the IRC daemon, and
possibly the entire system, unusable.
The following IRC daemons are known to be vulnerable:
IRCD-Hybrid ircd-hybrid 7.0.1
ircd-ratbox ircd-ratbox 1.5.1
ircd-ratbox ircd-ratbox 2.0 rc6
See also :
Upgrade to ircd-ratbox 1.5.2 and 2.0rc7 or IRCD-Hybrid 7.0.2.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true
Family: Denial of Service
Nessus Plugin ID: 14253 (ircd_rate_limiting.nasl)
Bugtraq ID: 10572
CVE ID: CVE-2004-0605
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.