CVE-2012-6084
Publication date 1 January 2013
Last updated 24 July 2024
Ubuntu priority
modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.
Status
Package | Ubuntu Release | Status |
---|---|---|
charybdis | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
ircd-ratbox | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
Patch details
Package | Patch details |
---|---|
charybdis |
|
ircd-ratbox |
|
References
Other references
- http://www.openwall.com/lists/oss-security/2013/01/01/1
- http://www.openwall.com/lists/oss-security/2013/01/01/2
- https://github.com/atheme/charybdis/commit/ac0707aa61d9c20e9b09062294701567c9f41595.patch
- http://www.stack.nl/~jilles/irc/charybdis-3.4.2.tbz2
- http://www.ratbox.org/download/ircd-ratbox-3.0.8.tar.bz2
- http://rabbit.dereferenced.org/~nenolod/ASA-2012-12-31.txt
- http://openwall.com/lists/oss-security/2013/01/01/4
- https://www.cve.org/CVERecord?id=CVE-2012-6084