Mandriva Linux Security Advisory : znc (MDVSA-2015:013)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated znc packages fix security vulnerabilities :

Multiple vulnerabilities were reported in ZNC version 1.0 which can be
exploited by malicious authenticated users to cause a denial of
service. These flaws are due to errors when handling the editnetwork,
editchan, addchan, and delchan page requests; they can be exploited to
cause a NULL pointer dereference (CVE-2013-2130).

Adding an already existing channel to a user/network via web admin in
ZNC causes a crash if the channel name isn't prefixed with '#'
(CVE-2014-9403).

See also :

http://advisories.mageia.org/MGASA-2013-0257.html
http://advisories.mageia.org/MGASA-2014-0543.html

Solution :

Update the affected znc and / or znc-devel packages.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 80432 ()

Bugtraq ID: 60199
66926

CVE ID: CVE-2013-2130
CVE-2014-9403

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now