{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before 3.6.0. The pgsql module contains a use after free vulnerability. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-09-20T06:06:23.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://docs.inspircd.org/security/2020-01/"},{"tags":["x_refsource_MISC"],"url":"https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea"},{"tags":["x_refsource_MISC"],"url":"https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9"},{"name":"DSA-4764","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2020/dsa-4764"},{"name":"[debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00015.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-25269","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before 3.6.0. The pgsql module contains a use after free vulnerability. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://docs.inspircd.org/security/2020-01/","refsource":"MISC","url":"https://docs.inspircd.org/security/2020-01/"},{"name":"https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea","refsource":"MISC","url":"https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea"},{"name":"https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9","refsource":"MISC","url":"https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9"},{"name":"DSA-4764","refsource":"DEBIAN","url":"https://www.debian.org/security/2020/dsa-4764"},{"name":"[debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00015.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T15:33:05.609Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://docs.inspircd.org/security/2020-01/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9"},{"name":"DSA-4764","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2020/dsa-4764"},{"name":"[debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00015.html"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2020-25269","datePublished":"2020-09-11T04:43:32.000Z","dateReserved":"2020-09-11T00:00:00.000Z","dateUpdated":"2024-08-04T15:33:05.609Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}