CVE-2021-29376
📋 TL;DR
This vulnerability in ircII IRC client allows remote attackers to crash the client via a specially crafted CTCP UTC message, causing denial of service by disconnecting the victim from IRC servers. It affects users of ircII IRC client versions before March 14, 2021.
💻 Affected Systems
- ircII
📦 What is this software?
Ircii by Eterna
⚠️ Risk & Real-World Impact
Worst Case
Malicious actor could mass-disconnect users from IRC networks, disrupting communication channels and causing service outages for IRC-dependent systems.
Likely Case
Targeted disconnection of specific users from IRC servers, potentially disrupting ongoing conversations or automated bot operations.
If Mitigated
Minimal impact with patched client or network filtering of malicious CTCP messages.
🎯 Exploit Status
Exploit requires sending specially crafted CTCP UTC message to target user on IRC network. No authentication needed beyond ability to send messages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 20210314 or later
Vendor Advisory: http://www.eterna.com.au/ircii/
Restart Required: Yes
Instructions:
1. Download latest ircII from http://www.eterna.com.au/ircii/ 2. Compile and install according to included instructions 3. Restart ircII client
🔧 Temporary Workarounds
Disable CTCP UTC responses
allConfigure ircII to ignore or not respond to CTCP UTC requests
/set ctcp_reply_utc off
Use IRC server filtering
allConfigure IRC server to filter or block CTCP UTC messages
🧯 If You Can't Patch
- Switch to alternative IRC client not affected by this vulnerability
- Implement network monitoring to detect and block malicious CTCP UTC messages
🔍 How to Verify
Check if Vulnerable:
Check ircII version with /version command or run 'ircII --version' from terminal
Check Version:
ircII --version
Verify Fix Applied:
Verify installed version is 20210314 or later and test with known exploit payload
📡 Detection & Monitoring
Log Indicators:
- ircII segmentation fault logs
- Unexpected client disconnections
- CTCP UTC messages with unusual content
Network Indicators:
- CTCP UTC messages with crafted payloads
- Multiple disconnection events from same source
SIEM Query:
source="irc*" AND (message="segmentation fault" OR message="crash" OR message="CTCP UTC")
🔗 References
- http://www.eterna.com.au/ircii/
- http://www.openwall.com/lists/oss-security/2021/03/30/4
- https://lists.debian.org/debian-lts-announce/2021/08/msg00022.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00023.html
- https://www.openwall.com/lists/oss-security/2021/03/24/2
- http://www.eterna.com.au/ircii/
- http://www.openwall.com/lists/oss-security/2021/03/30/4
- https://lists.debian.org/debian-lts-announce/2021/08/msg00022.html
- https://lists.debian.org/debian-lts-announce/2021/08/msg00023.html
- https://www.openwall.com/lists/oss-security/2021/03/24/2