CVE-2013-0238
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/02/2013
Last modified:
11/04/2025
Description
The try_parse_v4_netmask function in hostmask.c in IRCD-Hybrid before 8.0.6 does not properly validate masks, which allows remote attackers to cause a denial of service (crash) via a mask that causes a negative number to be parsed.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ircd-hybrid:ircd-hybrid:*:*:*:*:*:*:*:* | 8.0.5 (including) | |
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.3.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:7.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ircd-hybrid:ircd-hybrid:8.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267
- http://osvdb.org/89623
- http://secunia.com/advisories/51948
- http://secunia.com/advisories/52106
- http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786
- http://www.debian.org/security/2013/dsa-2618
- http://www.exploit-db.com/exploits/24951
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A093
- http://www.openwall.com/lists/oss-security/2013/01/29/8
- http://www.securityfocus.com/bid/57610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81695
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267
- http://osvdb.org/89623
- http://secunia.com/advisories/51948
- http://secunia.com/advisories/52106
- http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786
- http://www.debian.org/security/2013/dsa-2618
- http://www.exploit-db.com/exploits/24951
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A093
- http://www.openwall.com/lists/oss-security/2013/01/29/8
- http://www.securityfocus.com/bid/57610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81695
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055