vendor:
FiSH
by:
Caleb James DeLisle
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: FiSH
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2007-1397
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: irssi/fedora/x86
2007
FiSH IRC encryption evil ircd PoC exploit
FiSH is prone to multiple remote buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.
Mitigation:
Bounds-check user-supplied data before copying it into an insufficiently sized buffer.