CVE-2013-7049
Published Dec 23, 2013
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in fish.cpp in the Fish plugin for ZNC, as used in ZNC for Windows (znc-msvc) 0.206 and earlier, allows remote attackers to cause a denial of service (crash) via a long string in a DH1080_INIT message.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:znc:znc-msvc:*:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "E63DDCE9-F69A-4E81-901A-D6CAB380419C", "versionEndIncluding": "0.206" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.076:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "CC99CA9D-49DC-44C6-B703-9746C6D4C5BD" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.077:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "246BB485-1188-4748-BD9A-357801421070" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.078:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "2D8937E5-977E-475E-B134-D514E5A8569F" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.079:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "76FE39E2-4016-4700-985F-B3B01A5ABA0F" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.080:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "A9CF4039-E491-4E14-832C-E7A4F6F903DF" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.089:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "20E13BC3-2B86-47CB-AA92-93BFF0E64862" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.090:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "18C3F8F3-D88A-49DF-96E0-1367721F64B0" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.093:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "05C4B91A-FC69-4AF6-B309-925FB737BD0C" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.094:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "22B14BFC-FDB9-41E1-B4FD-AF5C351868BD" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.095:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "D084DE8E-3FB6-436D-9097-4B1088F7ECAC" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.097:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "4AC6EA87-1CA3-4C77-B1D8-1D7A7A289B4A" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.098:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "05EBBEBB-D72F-4D0A-BE9C-A8FBA2E8E628" }, { "criteria": "cpe:2.3:a:znc:znc-msvc:0.202:-:-:*:-:windows:*:*", "vulnerable": true, "matchCriteriaId": "354A511C-59B0-4311-8BE3-DC03817E93F1" } ], "operator": "OR" } ] } ]