Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Sep 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Talkative
Talkative irc |
|
Vendors & Products |
Talkative
Talkative irc |
Tue, 16 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 16 Sep 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication. | |
Title | Talkative IRC v0.4.4.16 Response Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-16T18:16:31.758Z
Reserved: 2025-08-27T18:34:34.964Z
Link: CVE-2009-20007

Updated: 2025-09-16T18:16:18.353Z

Status : Awaiting Analysis
Published: 2025-09-16T15:15:42.113
Modified: 2025-09-17T14:18:55.093
Link: CVE-2009-20007

No data.