CVE-2009-4016 (GCVE-0-2009-4016)
Vulnerability from cvelistv5 – Published: 2010-02-04 18:00 – Updated: 2024-09-16 20:58
VLAI?
Summary
Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:45:50.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "38382",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38382"
},
{
"name": "38381",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38381"
},
{
"name": "[ircd-ratbox] 20100125 ircd-ratbox-2.2.9 released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html"
},
{
"name": "DSA-1980",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-1980"
},
{
"name": "38383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38383"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES"
},
{
"name": "37978",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/37978"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev"
},
{
"name": "38210",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38210"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-02-04T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "38382",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38382"
},
{
"name": "38381",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38381"
},
{
"name": "[ircd-ratbox] 20100125 ircd-ratbox-2.2.9 released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html"
},
{
"name": "DSA-1980",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-1980"
},
{
"name": "38383",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38383"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES"
},
{
"name": "37978",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/37978"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev"
},
{
"name": "38210",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38210"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4016",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "38382",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38382"
},
{
"name": "38381",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38381"
},
{
"name": "[ircd-ratbox] 20100125 ircd-ratbox-2.2.9 released",
"refsource": "MLIST",
"url": "http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html"
},
{
"name": "DSA-1980",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-1980"
},
{
"name": "38383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38383"
},
{
"name": "http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES",
"refsource": "CONFIRM",
"url": "http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES"
},
{
"name": "37978",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37978"
},
{
"name": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev",
"refsource": "CONFIRM",
"url": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev"
},
{
"name": "38210",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38210"
},
{
"name": "http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4016",
"datePublished": "2010-02-04T18:00:00Z",
"dateReserved": "2009-11-19T00:00:00Z",
"dateUpdated": "2024-09-16T20:58:11.702Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-4016\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-02-04T20:15:23.750\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de enteros en la funci\u00f3n clean_string en (1) IRCD-hybrid v7.2.2 y v7.2.3, (2) ircd-ratbox anterior v2.2.9, y (3) oftc-hybrid anterior v1.6.8, cuando flatten_links es desactivado, permite a atacantes remotos ejecutar c\u00f3digo de su eleccion o caudar una denegaci\u00f3n de servicio (ca\u00edda demonio) a trav\u00e9s de un comando LINKS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"889E8F76-753E-4E71-B905-D0A481085486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"456247AA-A2E9-4D74-BFCC-3F7FC86A7EFF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.2.8\",\"matchCriteriaId\":\"EF9586F6-3C0F-43E2-97D4-E683C8A52386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F10AD4D-E56A-425F-85E2-A475913F99C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938FDDC7-636C-4993-9EF1-805CCD6635C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C72A832A-3C84-4A04-9549-C4D40A1826A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E6986B-BF5A-4AB0-AF99-DDE5729B64A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"830E6EFF-377A-458F-A797-09838C1105F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F88095-0F9F-4F3A-90A2-5C694329C1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E662122C-3882-4165-AAE1-7A15A7130E19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D58F57A-CE93-4998-8F1D-30DBD38A580F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A3F34E-F988-4CE5-BA73-7BF2318A21F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE489F4B-CA82-404E-92C4-977C30BCD8C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEABDAC0-B4D1-40E8-ACDF-CE9315C6B8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C72372DA-913B-4588-8F18-73A8142B8971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BC4E2F-D765-4800-9507-F000E02F39E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1CFF5A-922F-4588-A068-8EA1BCFD6447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5B83AA-B724-4236-AB2E-A414F1F13BA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713B9BB4-C05B-4A0B-8370-5E90C04A66E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BAF6FEF-A110-4EBF-B250-6DADEB649F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E978F29-D858-42A5-9718-8D649A48A3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D56D04-ADF2-4C1B-B585-70206A3430E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5D2FB5-E9F6-499C-84CC-3C51CA134796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA73841-3490-4D5F-9A5A-20D2D966C5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF5A2DE2-2321-4B0A-8B26-AC78A9099081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F16014-5F1E-426C-A426-39BCA38B49F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E447E199-B731-4D97-91A0-C9D830B730A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C37F551C-429B-469B-9B65-4AF571CBD03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCA9A04-99BD-4381-9DFB-C162B015B8FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C5CE25-71CC-4687-94B3-92D95A6CD741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADFF22E-DC56-4CB7-9E9F-838FBA434FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2B071E-127D-441D-9E9F-DF89C06ECB94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBA3A86-1D7F-4A97-A8D9-9CBE3586486D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B28D5E97-4265-49FC-96AA-85380C099854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C226114C-935E-4271-A571-85FD3E681EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9E49D4-A021-4514-BF7D-95A2D3D81489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A20C33E-4F22-4A06-A913-EC78307646D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C84A7D4-D72A-4375-973A-2667472DB841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42D63B8E-C534-4744-81D2-562A3A482D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D5C695-2267-4796-A499-1E396588AD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CF693E-BDD0-444C-94DB-F1D14768334C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF14F91B-1DAF-40AA-94F7-0B16E47E77A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F77DC6-3B6C-4F7B-8BE7-0CC357F7430A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20252BFB-6740-48A7-BE1E-04D5F8379D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D332723E-4015-4702-A280-BACAC965AB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656BE9FD-6B12-4341-B431-292FA7ADFA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F7ACAE-DCA7-4129-8FFE-34D99B9E5E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1071515E-4989-4930-8B3E-871056E15C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DFD9BC-51AB-4D29-87FB-E253E9B9DF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD99110C-908D-44D5-9E1B-76A3F69853B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF583AA-01F9-4BFD-9B0E-037446EC0C49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C08834C-326C-4FDD-94F6-BE7802365120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726E772C-EC4E-48C7-A0DC-A7F715611425\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF7D8EB-E5E4-4EBC-851F-DEB78123A562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC87A6A-A2BF-4ED4-8987-E2B097223325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F18235-5596-44B7-A5AE-5D2F71011C39\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.7\",\"matchCriteriaId\":\"F0C7CC91-D13E-4542-9A23-32A6BAE9E810\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC3894-A09E-4F10-8418-50176A3A7F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D457B8CD-99B0-4E11-B68C-39BA84E58906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6ECF9A5-0470-4C62-9003-3899E19C33B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0652A5D0-144C-4433-9994-C492F529FCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0889D77B-03B4-43AA-8EE3-281ACC5E6EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D241E0E-0D80-48CC-8ED5-0339B627C514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A5715B-9A87-492C-88DE-D4FD8790BD0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBD5C78-0EA5-448F-84E3-8EB5AC565576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37FDF780-1A2B-4F94-AB56-B550621534B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAA0465A-3FE6-421D-9BA4-BE7B33CBFD83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1B5E26-3140-428E-BBFB-061AA91FC640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F1537A5-EF6A-4B27-A15E-6DE1369BC4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D5234E-7A16-42CA-9DE0-A46A44EE9C5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0ED787-EA64-4022-963D-44A27FEE2B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D714B5C-12F2-4A88-9F4D-5B173C5BFB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3B8A7C-E6C5-459E-A097-C5C5EF830F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oftc:oftc-hybrid:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"009344FF-0CE8-4067-A90B-661047D94629\"}]}]}],\"references\":[{\"url\":\"http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/38210\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38381\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38383\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2010/dsa-1980\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/37978\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.debian.org/pool/updates/main/i/ircd-hybrid/ircd-hybrid_7.2.2.dfsg.2-4+lenny1.diff.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.ircd-hybrid.org:8000/viewcvs.cgi?rev=1044\u0026view=rev\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://trac.oftc.net/projects/oftc-hybrid/browser/tags/oftc-hybrid-1.6.8/RELNOTES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-1980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/37978\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…