Vulnerability Note VU#212651
InspIRCd heap corruption vulnerability
InspIRCd 2.0.5 and possibly other versions contain a heap corruption vulnerability that may be exploited with a specifically crafted DNS query.
InspIRCd contains a heap corruption vulnerability that exists in the dns.cpp code. The res buffer is allocated on the heap and can be overflowed. The res buffer can be exploited during its deallocation. The number of overflowed bytes can be controlled with DNS compression features.
A remote unauthenticated attacker may be able to execute arbitrary code with the permissions of the user running the InspIRCd service.
Apply an Update
The issue may be mitigated in some scenarios by changing your configuration file so <performance:nouserdns> is set to yes.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|InspIRCd||Affected||06 Feb 2012||19 Mar 2012|
|SUSE Linux||Not Affected||07 Feb 2012||13 Feb 2012|
|Debian GNU/Linux||Unknown||07 Feb 2012||07 Feb 2012|
|Gentoo Linux||Unknown||07 Feb 2012||07 Feb 2012|
|Mandriva S. A.||Unknown||07 Feb 2012||07 Feb 2012|
|Red Hat, Inc.||Unknown||07 Feb 2012||07 Feb 2012|
|Slackware Linux Inc.||Unknown||07 Feb 2012||07 Feb 2012|
|Ubuntu||Unknown||07 Feb 2012||07 Feb 2012|
CVSS Metrics (Learn More)
Thanks to Tomasz Salacinski of CERT Polska for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: Unknown
- Date Public: 19 Mar 2012
- Date First Published: 19 Mar 2012
- Date Last Updated: 09 Apr 2012
- Severity Metric: 1.06
- Document Revision: 25
If you have feedback, comments, or additional information about this vulnerability, please send us email.