CVE-2016-7145

Published on: 03/07/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:07 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Nefarious2 from Nefarious2 Project contain the following vulnerability:

The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.

  • CVE-2016-7145 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Fix to prevent SASL security vulnerability · evilnet/[email protected] · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5
oss-security - Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis Mailing List
Patch
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationNefarious2 ProjectNefarious22.0AllAllAll
ApplicationNefarious2 ProjectNefarious22.0AllAllAll
  • cpe:2.3:a:nefarious2_project:nefarious2:2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:nefarious2_project:nefarious2:2.0:*:*:*:*:*:*:*: