Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.debian.org/security/2010/dsa-1980
http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000890.html http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html http://www.vuxml.org/freebsd/192609c8-0c51-11df-82a0-00248c9b4be7.html
Insight
The following packages are affected:
ircd-ratbox
ircd-ratbox-devel
CVE-2009-4016
Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
CVE-2010-0300
cache.c in ircd-ratbox before 2.2.9 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a HELP command.
Severity
Classification
-
CVE CVE-2009-4016, CVE-2010-0300 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities