InspIRCd 2.0.6 Release Candidate 1

CPE Details

InspIRCd 2.0.6 Release Candidate 1
2.0.6
2020-09-14
10h24 +00:00
2020-09-14
10h24 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:inspircd:inspircd:2.0.6:rc1:*:*:*:*:*:*

Informations

Vendor

inspircd

Product

inspircd

Version

2.0.6

Update

rc1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-20917 2020-09-11 02h43 +00:00 An issue was discovered in InspIRCd 2 before 2.0.28 and 3 before 3.3.0. The mysql module contains a NULL pointer dereference when built against mariadb-connector-c 3.0.5 or newer. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server.
6.5
Medium
CVE-2020-25269 2020-09-11 02h43 +00:00 An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before 3.6.0. The pgsql module contains a use after free vulnerability. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server.
6.5
Medium
CVE-2015-6674 2017-04-13 12h00 +00:00 Buffer underflow vulnerability in the Debian inspircd package before 2.0.5-1+deb7u1 for wheezy and before 2.0.16-1 for jessie and sid. NOTE: This issue exists as an additional issue from an incomplete fix of CVE-2012-1836.
9.8
Critical
CVE-2016-7142 2016-09-26 13h00 +00:00 The m_sasl module in InspIRCd before 2.0.23, when used with a service that supports SASL_EXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message.
5.9
Medium
CVE-2015-8702 2016-04-12 12h00 +00:00 The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
8.6
High