The mauthenticate function in ircd/mauthenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
[
{
"digest": {
"line_hashes": [
"208219062012484996038940404366384603947",
"299618839438130165430991380132426443493",
"124370160900145148647823051765555358915",
"275687911345838898870057827048678759284",
"38238402662959267275467063390000386254",
"111013074550324480469116551169964853644",
"334510704401903841769322909532342299666",
"256792836499928675302235018837842196977"
],
"threshold": 0.9
},
"source": "https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5",
"target": {
"file": "ircd/m_authenticate.c"
},
"deprecated": false,
"id": "CVE-2016-7145-0f9b3c52",
"signature_type": "Line",
"signature_version": "v1"
},
{
"digest": {
"length": 2687.0,
"function_hash": "16296848066876065388828299164195817332"
},
"source": "https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5",
"target": {
"function": "m_authenticate",
"file": "ircd/m_authenticate.c"
},
"deprecated": false,
"id": "CVE-2016-7145-b149c8f1",
"signature_type": "Function",
"signature_version": "v1"
}
]