FreeBSD : InspIRCd websocket module double free vulnerability (53e9efa1-4be7-11eb-8558-3085a9a47796)

high Nessus Plugin ID 144673

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The InspIRCd development team reports :

The websocket module before v3.8.1 contains a double free vulnerability. When combined with a HTTP reverse proxy this vulnerability can be used by any user who is [GKZ]-lined to remotely crash an InspIRCd server.

Solution

Update the affected package.

See Also

https://docs.inspircd.org/security/2020-02/

http://www.nessus.org/u?19393ddc

Plugin Details

Severity: High

ID: 144673

File Name: freebsd_pkg_53e9efa14be711eb85583085a9a47796.nasl

Version: 1.1

Type: local

Published: 1/4/2021

Updated: 1/4/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:inspircd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/1/2021

Vulnerability Publication Date: 2/1/2020