InspIRCd 2.0.5 and possibly other versions contain a heap corruption vulnerability that may be exploited with a specifically crafted DNS query.
InspIRCd contains a heap corruption vulnerability that exists in the dns.cpp code. The res buffer is allocated on the heap and can be overflowed. The res buffer can be exploited during its deallocation. The number of overflowed bytes can be controlled with DNS compression features.
A remote unauthenticated attacker may be able to execute arbitrary code with the permissions of the user running the InspIRCd service.
Apply an Update
The issue may be mitigated in some scenarios by changing your configuration file so <performance:nouserdns> is set to yes.
Thanks to Tomasz Salacinski of CERT Polska for reporting this vulnerability.
This document was written by Jared Allar.
|Date First Published:||2012-03-19|
|Date Last Updated:||2012-04-09 20:08 UTC|