PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5195 Irssi CVE debrief

CVE-2017-5195 is a denial-of-service vulnerability in Irssi that can be triggered remotely by sending a crafted ANSI x8 color code. The flaw is an out-of-bounds read that can cause the client to crash. NVD lists the affected range as Irssi 0.8.17 through versions before 0.8.21, and the CVSS v3.0 vector indicates network access, no privileges, no user interaction, and high availability impact.

Vendor
Irssi
Product
CVE-2017-5195
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-03
Original CVE updated
2026-05-13
Advisory published
2017-03-03
Advisory updated
2026-05-13

Who should care

Irssi users, system administrators, and distribution/package maintainers should care, especially for environments where IRC clients are exposed to untrusted message content. Security teams managing desktop or terminal-based communication tools should prioritize updating affected Irssi installations.

Technical summary

NVD describes the issue as CWE-125 (out-of-bounds read). A remote attacker can supply a crafted ANSI x8 color code that leads Irssi to read outside the intended memory bounds, resulting in a crash. The vulnerability is network-exploitable, requires no privileges or user interaction, and affects Irssi versions from 0.8.17 up to but not including 0.8.21.

Defensive priority

High for any environment running affected Irssi versions, because exploitation is remote and unauthenticated and can disrupt client availability. The impact is limited to denial of service, but the low attack complexity and lack of user interaction make timely patching appropriate.

Recommended defensive actions

  • Upgrade Irssi to 0.8.21 or later.
  • Apply vendor or distribution security updates that include the Irssi fix.
  • Review the Irssi security advisory for any version-specific remediation guidance.
  • If immediate upgrade is not possible, restrict use of affected clients in high-trust workflows and monitor for unexpected crashes while planning remediation.

Evidence notes

This debrief is based on the NVD record for CVE-2017-5195, which lists the affected version range, CVSS vector, and CWE-125 classification. The vendor advisory and related references are provided in the NVD metadata, including the Irssi security notice and contemporaneous mailing-list and distribution advisories.

Official resources

Publicly disclosed on 2017-03-03 per the CVE/NVD record, with earlier vendor and mailing-list references appearing in January 2017. NVD later marked the entry modified on 2026-05-13.