Bug 1064540 (CVE-2017-15227)

Summary: VUL-0: CVE-2017-15227, CVE-2017-15228, CVE-2017-15721, CVE-2017-15722, CVE-2017-15723: irssi: multiple vulnerabilities fixed in 1.0.5
Product: [openSUSE] openSUSE Distribution Reporter: Andreas Stieger <astieger>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P3 - Medium CC: ailin.nemui, meissner, mrueckert
Version: Leap 42.3   
Target Milestone: ---   
Hardware: All   
OS: openSUSE 42.3   
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Andreas Stieger 2017-10-22 15:23:53 UTC
https://irssi.org/security/irssi_sa_2017_10.txt

IRSSI-SA-2017-10 Irssi Security Advisory
============================================
CVE-2017-15228, CVE-2017-15227, CVE-2017-15721, CVE-2017-15723,
CVE-2017-15722

Description
-----------

Multiple vulnerabilities have been located in Irssi.

(a) When installing themes with unterminated colour formatting
    sequences, Irssi may access data beyond the end of the
    string. (CWE-126) Found by Hanno Böck.

    CVE-2017-15228 was assigned to this issue.

(b) While waiting for the channel synchronisation, Irssi may
    incorrectly fail to remove destroyed channels from the query list,
    resulting in use after free conditions when updating the state
    later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

    CVE-2017-15227 was assigned to this issue.

(c) Certain incorrectly formatted DCC CTCP messages could cause NULL
    pointer dereference. Found by Joseph Bisch. This is a separate,
    but similar issue to CVE-2017-9468. (CWE-690)

    CVE-2017-15721 was assigned to this issue.

(d) Overlong nicks or targets may result in a NULL pointer dereference
    while splitting the message. Found by Joseph Bisch. (CWE-690)

    CVE-2017-15723 was assigned to this issue.

(e) In certain cases Irssi may fail to verify that a Safe channel ID
    is long enough, causing reads beyond the end of the string. Found
    by Joseph Bisch. (CWE-126)

    CVE-2017-15722 was assigned to this issue.


Impact
------

(a,b,c,d) May result in denial of service (remote crash).

(e) May affect the stability of Irssi.


Affected versions
-----------------

(a,b,c,e) All Irssi versions that we observed.

(d) Starting from 0.8.17.


Fixed in
--------

Irssi 1.0.5


Recommended action
------------------

Upgrade to Irssi 1.0.5. Irssi 1.0.5 is a maintenance release in the
1.0 series, without any new features.

After installing the updated packages, one can issue the /upgrade
command to load the new binary. TLS connections will require
/reconnect.


Mitigating facts
----------------

(a) requires user to install malicious or broken theme file

(b,c,e) requires a broken ircd or control over the ircd

(d) irc servers typically have length limits in place


Patch
-----

https://github.com/irssi/irssi/commit/43e44d553d44e313003cee87e6ea5e24d68b84a1



Maintainer already submitted:
https://build.opensuse.org/request/show/535794
https://build.opensuse.org/request/show/535795
Comment 1 Andreas Stieger 2017-10-22 17:30:57 UTC
Processed for maintenance
Comment 2 Andreas Stieger 2017-10-23 07:58:06 UTC
done, closing
Comment 3 Swamp Workflow Management 2017-10-23 13:08:39 UTC
openSUSE-SU-2017:2832-1: An update that fixes 5 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1064540
CVE References: CVE-2017-15227,CVE-2017-15228,CVE-2017-15721,CVE-2017-15722,CVE-2017-15723
Sources used:
openSUSE Leap 42.3 (src):    irssi-1.0.5-17.1
openSUSE Leap 42.2 (src):    irssi-1.0.5-14.14.1
Comment 4 Swamp Workflow Management 2017-10-23 13:09:47 UTC
openSUSE-SU-2017:2835-1: An update that fixes 5 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1064540
CVE References: CVE-2017-15227,CVE-2017-15228,CVE-2017-15721,CVE-2017-15722,CVE-2017-15723
Sources used:
SUSE Package Hub for SUSE Linux Enterprise 12 (src):    irssi-1.0.5-32.1