
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-8955 affects WeeChat through version 2.7, specifically in the irc_mode_channel_update function within plugins/irc/irc-mode.c. The vulnerability was discovered and reported by Stuart Nevans Locke, with public disclosure on February 12, 2020 (NVD, WeeChat Security).
The vulnerability is a buffer overflow vulnerability that occurs when processing malformed IRC message 324 (channel mode). It has been assigned a CVSS v3.1 base score of 9.8 (Critical) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified as CWE-120: Buffer Copy without Checking Size of Input (NVD).
The vulnerability allows remote attackers to cause a denial of service (buffer overflow and application crash) or potentially have unspecified other impacts via a malformed IRC message 324 (channel mode) (NVD, Gentoo Security).
The vulnerability was fixed in WeeChat version 2.7.1. There are no known workarounds, and users are strongly recommended to upgrade to the latest version. The fix was implemented through a patch that addresses the buffer overflow issue (WeeChat Security, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."