{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-50784", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "url": "https://www.unrealircd.org/index/news", "refsource": "MISC", "name": "https://www.unrealircd.org/index/news" }, { "refsource": "CONFIRM", "name": "https://forums.unrealircd.org/viewtopic.php?t=9340", "url": "https://forums.unrealircd.org/viewtopic.php?t=9340" }, { "refsource": "FEDORA", "name": "FEDORA-2023-41f41fbb69", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BV6TFYPQOKYRGPEAKOWSO6PSCBV6LUR3/" }, { "refsource": "FEDORA", "name": "FEDORA-2023-7c6c696102", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZT7QU4FCQBHYOYVD7FW5QAWNAQCSGLA/" } ] }, "source": { "discovery": "INTERNAL" } }