Multiple ircii-based Clients Remote Overflows

medium Nessus Network Monitor Plugin ID 1858

Synopsis

The remote host is running a version of the BitchX IRC client that may contain buffer overflows.

Description

Multiple vendor ircii-based client, including BitchX version 1.0c19 and possibly earlier, are vulnerable to multiple buffer overflows. A remote attacker could overflow a buffer to cause the corruption of heap memory, allowing the attacker to execute arbitrary code on the system or possibly cause the client to crash.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 1858

Family: IRC Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:colten_edwards:bitchx

Reference Information

CVE: CVE-2003-0321, CVE-2003-0328

BID: 7086, 7096, 7097, 7099, 7100