UnrealIRCd: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201006-21 / unrealircd
||June 14, 2010
||June 14, 2010: 02
All supported architectures
Multiple vulnerabilities in UnrealIRCd might allow remote attackers to
compromise the "unrealircd" account, or cause a Denial of Service.
UnrealIRCd is an Internet Relay Chat (IRC) daemon.
Multiple vulnerabilities have been reported in UnrealIRCd:
- The vendor reported a buffer overflow in the user authorization
- The vendor reported that the distributed source code of UnrealIRCd
was compromised and altered to include a system() call that could be
called with arbitrary user input (CVE-2010-2075).
A remote attacker could exploit these vulnerabilities to cause the
execution of arbitrary commands with the privileges of the user running
UnrealIRCd, or a Denial of Service condition. NOTE: By default
UnrealIRCd on Gentoo is run with the privileges of the "unrealircd"
There is no known workaround at this time.
All UnrealIRCd users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-irc/unrealircd-22.214.171.124-r1"