Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication.
CVSS
No CVSS.
References
Configurations
No configuration.
History
16 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/talkative_response.rb - | |
References | () https://www.exploit-db.com/exploits/16459 - | |
References | () https://www.exploit-db.com/exploits/8227 - | |
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2009-4909.php - |
16 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-16 15:15
Updated : 2025-09-17 14:18
NVD link : CVE-2009-20007
Mitre link : CVE-2009-20007
CVE.ORG link : CVE-2009-20007
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow