CVE-2020-8955
high-risk
Published 2020-02-12
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
Do I need to act?
!
14.2% chance of exploitation in next 30 days
EPSS score — higher than 86% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (9)
Affected Vendors
References (18)
Third Party Advisory
https://security.gentoo.org/glsa/202003-51
Vendor Advisory
https://weechat.org/doc/security/
Third Party Advisory
https://security.gentoo.org/glsa/202003-51
Vendor Advisory
https://weechat.org/doc/security/
59
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
12/34 · Low
Exposure
15/34 · Moderate