<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for irssi</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2835-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-10-23T07:58:14Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-10-23T07:58:14Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-10-23T07:58:14Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for irssi</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This security update for irssi to version  1.0.5 addresses the following security issues:


* CVE-2017-15228: When installing themes with unterminated colour formatting
  sequences, Irssi may access data beyond the end of the string.
  This issue could have resulted in denial of service (remote crash) when 
  installing a malicious or broken theme file.
* CVE-2017-15227: While waiting for the channel synchronisation, Irssi may
  incorrectly fail to remove destroyed channels from the query list,
  resulting in use after free conditions when updating the state later on.
  This issue could have caused denial of service (remote crash) when
  connecting to a malicious or broken ircd.
* CVE-2017-15721: Certain incorrectly formatted DCC CTCP messages could cause
  NULL pointer dereference.
  This issue could have caused denial of service (remote crash) when
  connecting to a malicious or broken ircd.
* CVE-2017-15723: Overlong nicks or targets may result in a NULL pointer
  dereference while splitting the message.
  This issue could have caused denial of service (remote crash) when
  connecting to a malicious or broken ircd.
* CVE-2017-15722:  In certain cases Irssi may fail to verify that a Safe 
  channel ID is long enough, causing reads beyond the end of the string.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-1189</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1064540</URL>
      <Description>SUSE Bug 1064540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15227/</URL>
      <Description>SUSE CVE CVE-2017-15227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15228/</URL>
      <Description>SUSE CVE CVE-2017-15228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15721/</URL>
      <Description>SUSE CVE CVE-2017-15721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15722/</URL>
      <Description>SUSE CVE CVE-2017-15722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15723/</URL>
      <Description>SUSE CVE CVE-2017-15723 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="irssi-1.0.5-32.1">
      <FullProductName ProductID="irssi-1.0.5-32.1">irssi-1.0.5-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="irssi-devel-1.0.5-32.1">
      <FullProductName ProductID="irssi-devel-1.0.5-32.1">irssi-devel-1.0.5-32.1</FullProductName>
    </Branch>
    <Relationship ProductReference="irssi-1.0.5-32.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:irssi-1.0.5-32.1">irssi-1.0.5-32.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="irssi-devel-1.0.5-32.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:irssi-devel-1.0.5-32.1">irssi-devel-1.0.5-32.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on.</Note>
    </Notes>
    <CVE>CVE-2017-15227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:irssi-1.0.5-32.1</ProductID>
        <ProductID>SUSE Package Hub 12:irssi-devel-1.0.5-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15227.html</URL>
        <Description>CVE-2017-15227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064540</URL>
        <Description>SUSE Bug 1064540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string.</Note>
    </Notes>
    <CVE>CVE-2017-15228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:irssi-1.0.5-32.1</ProductID>
        <ProductID>SUSE Package Hub 12:irssi-devel-1.0.5-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15228.html</URL>
        <Description>CVE-2017-15228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064540</URL>
        <Description>SUSE Bug 1064540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468.</Note>
    </Notes>
    <CVE>CVE-2017-15721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:irssi-1.0.5-32.1</ProductID>
        <ProductID>SUSE Package Hub 12:irssi-devel-1.0.5-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15721.html</URL>
        <Description>CVE-2017-15721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064540</URL>
        <Description>SUSE Bug 1064540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.</Note>
    </Notes>
    <CVE>CVE-2017-15722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:irssi-1.0.5-32.1</ProductID>
        <ProductID>SUSE Package Hub 12:irssi-devel-1.0.5-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15722.html</URL>
        <Description>CVE-2017-15722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064540</URL>
        <Description>SUSE Bug 1064540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message.</Note>
    </Notes>
    <CVE>CVE-2017-15723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:irssi-1.0.5-32.1</ProductID>
        <ProductID>SUSE Package Hub 12:irssi-devel-1.0.5-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15723.html</URL>
        <Description>CVE-2017-15723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064540</URL>
        <Description>SUSE Bug 1064540</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
