irssi Use after free SASL Vulnerability
This exploit of the day is very exciting, it affects a chat client that have been actively used since its release in 1999! The vulnerability is affect the sasl( Simple Authentication and Security Layer ) authentication.
If you are running irssi less then 1.2.1 (check with human@computer:~$ irssi -v).
If you have a long time running instance of irssi you will need to restart your session:
[0]: upgrade the irssi package
[1]: in irssi run /upgrade , this will load the new binary patch
[2]: reconnect to the irc server
Git code patch
The solutions was to validate the sasl requests better
g_free_not_null(ircconn->usermode);
g_free_not_null(ircconn->alternate_nick);
g_free_not_null(ircconn->sasl_username);
g_free_not_null(ircconn->sasl_password);
}
rec->sasl_username = g_strdup(src->sasl_username);
rec->sasl_password = g_strdup(src->sasl_password);
Git commit 5a67b983dc97caeb5df1139aabd0bc4f260a47d8
CVE: CVE-2019-13045
External links:
Irssi blog post
Bugtraq
Firo
Stay up to date with Vulnerability Management and build cool things with our API