PatchSiren cyber security CVE debrief
CVE-2017-5195 Irssi CVE debrief
CVE-2017-5195 is a denial-of-service vulnerability in Irssi that can be triggered remotely by sending a crafted ANSI x8 color code. The flaw is an out-of-bounds read that can cause the client to crash. NVD lists the affected range as Irssi 0.8.17 through versions before 0.8.21, and the CVSS v3.0 vector indicates network access, no privileges, no user interaction, and high availability impact.
- Vendor
- Irssi
- Product
- CVE-2017-5195
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-03
- Advisory updated
- 2026-05-13
Who should care
Irssi users, system administrators, and distribution/package maintainers should care, especially for environments where IRC clients are exposed to untrusted message content. Security teams managing desktop or terminal-based communication tools should prioritize updating affected Irssi installations.
Technical summary
NVD describes the issue as CWE-125 (out-of-bounds read). A remote attacker can supply a crafted ANSI x8 color code that leads Irssi to read outside the intended memory bounds, resulting in a crash. The vulnerability is network-exploitable, requires no privileges or user interaction, and affects Irssi versions from 0.8.17 up to but not including 0.8.21.
Defensive priority
High for any environment running affected Irssi versions, because exploitation is remote and unauthenticated and can disrupt client availability. The impact is limited to denial of service, but the low attack complexity and lack of user interaction make timely patching appropriate.
Recommended defensive actions
- Upgrade Irssi to 0.8.21 or later.
- Apply vendor or distribution security updates that include the Irssi fix.
- Review the Irssi security advisory for any version-specific remediation guidance.
- If immediate upgrade is not possible, restrict use of affected clients in high-trust workflows and monitor for unexpected crashes while planning remediation.
Evidence notes
This debrief is based on the NVD record for CVE-2017-5195, which lists the affected version range, CVSS vector, and CWE-125 classification. The vendor advisory and related references are provided in the NVD metadata, including the Irssi security notice and contemporaneous mailing-list and distribution advisories.
Official resources
-
CVE-2017-5195 CVE record
CVE.org
-
CVE-2017-5195 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed on 2017-03-03 per the CVE/NVD record, with earlier vendor and mailing-list references appearing in January 2017. NVD later marked the entry modified on 2026-05-13.