The msasl module in InspIRCd before 2.0.23, when used with a service that supports SASLEXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message.
[
{
"deprecated": false,
"source": "https://github.com/inspircd/inspircd/commit/74fafb7f11b06747f69f182ad5e3769b665eea7a",
"id": "CVE-2016-7142-c365f1aa",
"signature_version": "v1",
"target": {
"file": "src/modules/m_sasl.cpp"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"228079100025838756566783257419945490230",
"199453309722348137967308897277233626545",
"75568141879148473872567936027356473789",
"229948159184132439404118629736615035392",
"291717704696387397784739008266277477665",
"140736679419546910721805029205819158161",
"161847622082612713858670827218507998792"
]
},
"signature_type": "Line"
}
]