The msasl module in InspIRCd before 2.0.23, when used with a service that supports SASLEXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7142.json"
[
{
"signature_version": "v1",
"source": "https://github.com/inspircd/inspircd/commit/74fafb7f11b06747f69f182ad5e3769b665eea7a",
"digest": {
"threshold": 0.9,
"line_hashes": [
"228079100025838756566783257419945490230",
"199453309722348137967308897277233626545",
"75568141879148473872567936027356473789",
"229948159184132439404118629736615035392",
"291717704696387397784739008266277477665",
"140736679419546910721805029205819158161",
"161847622082612713858670827218507998792"
]
},
"target": {
"file": "src/modules/m_sasl.cpp"
},
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2016-7142-c365f1aa"
}
]