Lucene search

K
gentooGentoo FoundationGLSA-200909-17
HistorySep 13, 2009 - 12:00 a.m.

ZNC: Directory traversal

2009-09-1300:00:00
Gentoo Foundation
security.gentoo.org
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.017

Percentile

87.8%

Background

ZNC is an advanced IRC bouncer.

Description

The vendor reported a directory traversal vulnerability when processing DCC SEND requests.

Impact

A remote, authenticated user could send a specially crafted DCC SEND request to overwrite arbitrary files with the privileges of the user running ZNC, and possibly cause the execution of arbitrary code e.g. by uploading a malicious ZNC module.

Workaround

There is no known workaround at this time.

Resolution

All ZNC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-irc/znc-0.074"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-irc/znc< 0.074UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.017

Percentile

87.8%