|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2598-1 (weechat - several vulnerabilities)|
|Summary:||Two security issues have been discovered in WeeChat, a fast, light and;extensible chat client:;;CVE-2011-1428;X.509 certificates were incorrectly validated.;;CVE-2012-5534;The hook_process function in the plugin API allowed the execution;of arbitrary shell commands.|
Two security issues have been discovered in WeeChat, a fast, light and
extensible chat client:
X.509 certificates were incorrectly validated.
The hook_process function in the plugin API allowed the execution
of arbitrary shell commands.
weechat on Debian Linux
For the stable distribution (squeeze), these problems have been fixed in
For the testing distribution (wheezy), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your weechat packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-1428|
BugTraq ID: 46612
Common Vulnerability Exposure (CVE) ID: CVE-2012-5534
BugTraq ID: 56584
SuSE Security Announcement: openSUSE-SU-2012:1580 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0150 (Google Search)
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.