ASA-201609-20 generated external raw

[ASA-201609-20] irssi: arbitrary code execution
Arch Linux Security Advisory ASA-201609-20 ========================================== Severity: High Date : 2016-09-22 CVE-ID : CVE-2016-7045 Package : irssi Type : arbitrary code execution Remote : Yes Link : Summary ======= The package irssi before version 0.8.20-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 0.8.20-1. # pacman -Syu "irssi>=0.8.20-1" The problem has been fixed upstream in version 0.8.20. Workaround ========== None. Description =========== The format_send_to_gui() function does not validate the length of the string before incrementing the `ptr' pointer in all cases. If that happens, the pointer `ptr' can be incremented twice and thus end past the boundaries of the original `dup' buffer. Remote code execution might be difficult since only Nuls are written. Impact ====== A remote attacker can perform a denial of service attack or possibly execute arbitrary code on the affected host. References ==========