weechat-security
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Security vulnerability fixed in WeeChat 3.2.1


From: Sébastien Helleu
Subject: Security vulnerability fixed in WeeChat 3.2.1
Date: Sat, 4 Sep 2021 21:48:11 +0200
User-agent: Mutt/1.10.1 (2018-07-13)

Hi all,

A security vulnerability has been fixed in WeeChat 3.2.1, which was released a
few hours ago: a malformed websocket frame sent to the relay plugin can cause a
buffer overflow and possibly a crash.

This happens only if you define a relay (irc or weechat), even if a password is
defined (the crash happens before the authentication of the client).

This vulnerability affects WeeChat versions from 0.4.1 to 3.2.

Some workarounds, if you can not upgrade:

- remove all relays
- unload the relay plugin
- secure relay to allow only some trusted IP addresses
  (option relay.network.allowed_ips).

Thanks to Stuart Nevans Locke for reporting the problem.

For more info, please visit the WeeChat security page:
https://weechat.org/doc/security/

-- 
Sébastien Helleu

web: weechat.org / flashtux.org
irc: FlashCode @ irc.libera.chat

Attachment: signature.asc
Description: PGP signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]