** Description changed:

  I plan on trying to patch these over the next few weeks or so, hence the
  "bug report".
  
  Based on information found in http://people.canonical.com/~ubuntu-
  security/cve/pkg/znc.html, the following CVEs are unfixed in the version
  of ZNC on Lucid (and indirectly, on Hardy, although Hardy's codebase is
  old enough for any patches to not apply correctly):
  
  CVE-2010-2448:
  znc.cpp in ZNC before 0.092 allows remote authenticated users to cause a
  denial of service (crash) by requesting traffic statistics when there is an
  active unauthenticated connection, which triggers a NULL pointer
  dereference, as demonstrated using (1) a traffic link in the web
  administration pages or (2) the traffic command in the /znc shell.
  
  CVE-2010-2488:
  denial of service bug - refer to 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929 for additional details.
  
  CVE-2010-2812:
  Client.cpp in ZNC 0.092 allows remote attackers to cause a denial of
  service (exception and daemon crash) via a PING command that lacks an
  argument.
  
  CVE-2010-2934:
  Multiple unspecified vulnerabilities in ZNC 0.092 allow remote attackers to
  cause a denial of service (exception and daemon crash) via unknown vectors
  related to "unsafe substr() calls."
  
- 
  Currently supported Releases at the time of this bug report, and whether they 
are affected:
  Hardy: Affected
  Lucid: Affected (0.078-1 in release/universe)
  Oneiric: Not Affected (0.098-2ubuntu1)
  Precise: Not Affected (0.206-1)
  Quantal: Not Affected (0.206-2)
- Raring: Not Affected (1.0-1 in release/universe, 1.0-2 in proposed)
+ Raring: Not Affected (1.0-2)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1090195

Title:
  ZNC security report: CVEs for Lucid, Hardy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/znc/+bug/1090195/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to