Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2:beta11:*:*:*:*:*:*", "matchCriteriaId": "BA73C6B3-F7F1-4907-B396-4D208A44CF9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185F2F0-1791-43A8-BDCF-6A0C88EC9747", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:pre1:*:*:*:*:*:*", "matchCriteriaId": "C7D99A6A-E9C6-4F24-9A42-8DDD90356940", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.1:pre2:*:*:*:*:*:*", "matchCriteriaId": "E08A61AB-D7B7-4CE8-90DD-955DAE660050", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "62F921EE-278D-4608-8F0E-97F6A8F08468", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.2:pre1:*:*:*:*:*:*", "matchCriteriaId": "DE98C6FE-5195-4A03-A6A7-0F3AA39A5132", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "260E29F2-8EEE-4F50-A64B-57BF51193780", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre1:*:*:*:*:*:*", "matchCriteriaId": "8C8D661C-B09E-4615-9858-A0FFAA500C63", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre2:*:*:*:*:*:*", "matchCriteriaId": "B9279F94-5159-41B0-99DF-A389910E7C3F", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre3:*:*:*:*:*:*", "matchCriteriaId": "243E88AF-2178-42B3-A563-76C23EDD1278", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.3:pre4:*:*:*:*:*:*", "matchCriteriaId": "D7112386-BE35-45A8-813B-03D7D6495958", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "06D9F64A-CBB8-4B49-BC09-F0B267C98EE5", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:pre1:*:*:*:*:*:*", "matchCriteriaId": "A7BDC698-18A0-4F1E-92B0-7E7D1D2F80AD", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:pre2:*:*:*:*:*:*", "matchCriteriaId": "3E482F0F-E98E-4D2A-822F-08C372A7FC73", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "2B6D6A15-60EA-4B27-87AA-197F014F6CD7", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "635EC169-C8C8-4C52-84BC-48765DC375A9", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "2EEA8E08-215E-47CA-9074-A59098CB5EE3", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "744421B9-961E-423B-BB86-60F23D88F5B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "6FAB49F5-D94B-47CF-B810-B7FBAD8ADFAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "2EF31F4C-13A3-4585-A737-7F1E95A4F2BD", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "8F908926-F2DF-4DA1-B67D-33D6ED0F3685", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F4F8A053-9596-4D33-A27E-D94E67618938", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9CD5E4B-0C96-4BEE-A590-1419565BB89D", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "918C2949-60CC-4BD7-871E-A2C0909C4520", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "ADB9644D-A12B-40C8-9673-83F0EE07898F", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBB21BA6-DC3D-47C7-8969-F3B4BB0EF964", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "940628BB-42FA-48E8-BB60-C0483C4EE77D", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "E4258FC4-1D85-44BF-85DF-DFACE704D358", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "DCCCF5D1-EDA5-4793-BBDD-39D89248D97B", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0B364F-FC24-4F3A-874A-8235AC99A3BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:unrealircd:unrealircd:3.2.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "8B8C2218-D20D-402A-BA75-A2063FC80163", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en UnrealIRCd 3.2beta11 a 3.2.8, cuando allow::options::noident est\u00e1 habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados."}], "id": "CVE-2009-4893", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-06-15T14:04:26.233", "references": [{"source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/42077"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201006-21.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/06/14/13"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42077"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}