InspIRCd 1.1.0 B6.

CPE Details

InspIRCd 1.1.0 B6.
1.1.0
2020-09-14
10h24 +00:00
2020-09-14
10h24 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:inspircd:inspircd:1.1.0:b6.:*:*:*:*:*:*

Informations

Vendor

inspircd

Product

inspircd

Version

1.1.0

Update

b6.

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2012-6696 2017-09-25 19h00 +00:00 inspircd in Debian before 2.0.7 does not properly handle unsigned integers. NOTE: This vulnerability exists because of an incomplete fix to CVE-2012-1836.
9.8
Critique
CVE-2015-6674 2017-04-13 12h00 +00:00 Buffer underflow vulnerability in the Debian inspircd package before 2.0.5-1+deb7u1 for wheezy and before 2.0.16-1 for jessie and sid. NOTE: This issue exists as an additional issue from an incomplete fix of CVE-2012-1836.
9.8
Critique
CVE-2016-7142 2016-09-26 13h00 +00:00 The m_sasl module in InspIRCd before 2.0.23, when used with a service that supports SASL_EXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message.
5.9
Moyen
CVE-2015-8702 2016-04-12 12h00 +00:00 The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
8.6
Haute
CVE-2008-1925 2008-04-23 15h00 +00:00 Buffer overflow in InspIRCd before 1.1.18, when using the namesx and uhnames modules, allows remote attackers to cause a denial of service (daemon crash) via a large number of channel users with crafted nicknames, idents, and long hostnames.
5