This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201908-15">
<title>ZNC: Privilege escalation</title>
<synopsis>A vulnerability in ZNC allows users to escalate privileges.</synopsis>
<producttype="ebuild">znc</product>
<announced>2019-08-15</announced>
<revisedcount="1">2019-08-15</revised>
<bug>688152</bug>
<access>remote</access>
<affected>
<packagename="net-irc/znc"auto="yes"arch="*">
<unaffectedrange="ge">1.7.4_rc1</unaffected>
<vulnerablerange="lt">1.7.4_rc1</vulnerable>
</package>
</affected>
<background>
<p>ZNC is an advanced IRC bouncer.</p>
</background>
<description>
<p>It was discovered that ZNC’s “Modules.cpp” allows remote
authenticated non-admin users to escalate privileges.
</p>
</description>
<impacttype="normal">
<p>A remote authenticated attacker could escalate privileges and
subsequently execute arbitrary code or conduct a Denial of Service
attack.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All ZNC users should upgrade to the latest version:</p>