Mandriva Linux Security Advisory : znc (MDVSA-2015:013)

Medium Nessus Plugin ID 80432


The remote Mandriva Linux host is missing one or more security updates.


Updated znc packages fix security vulnerabilities :

Multiple vulnerabilities were reported in ZNC version 1.0 which can be exploited by malicious authenticated users to cause a denial of service. These flaws are due to errors when handling the editnetwork, editchan, addchan, and delchan page requests; they can be exploited to cause a NULL pointer dereference (CVE-2013-2130).

Adding an already existing channel to a user/network via web admin in ZNC causes a crash if the channel name isn't prefixed with '#' (CVE-2014-9403).


Update the affected znc and / or znc-devel packages.

See Also

Plugin Details

Severity: Medium

ID: 80432

File Name: mandriva_MDVSA-2015-013.nasl

Version: 1.5

Type: local

Published: 2015/01/09

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:znc, p-cpe:/a:mandriva:linux:znc-devel, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/01/08

Reference Information

CVE: CVE-2013-2130, CVE-2014-9403

BID: 60199, 66926

MDVSA: 2015:013