๐Ÿ” CVE Alert

CVE-2009-20007

UNKNOWN 0.0

Talkative IRC v0.4.4.16 Response Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication.

CWE CWE-121
Vendor talkative
Product talkative irc
Published Sep 16, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for talkative talkative irc

Be the first to know when new unknown vulnerabilities affecting talkative talkative irc are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Talkative / Talkative IRC
* โ‰ค 0.4.4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/talkative_response.rb exploit-db.com: https://www.exploit-db.com/exploits/8227 exploit-db.com: https://www.exploit-db.com/exploits/16459 zeroscience.mk: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2009-4909.php web.archive.org: https://web.archive.org/web/20090116203306/http://www.talkative-irc.com/ vulncheck.com: https://www.vulncheck.com/advisories/talkative-irc-response-buffer-overflow

Credits

Gjoko Krstic "LiquidWorm" of Zero Science Lab