CVE-2015-3427
https://notcve.org/view.php?id=CVE-2015-3427
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422. Quassel anterior a 0.12.2 no maneja debidamente la reinicialización de la sesión de la base de datos cuando la base de datos PostgreSQL es reiniciada, lo que permite a atacantes remotos llevar a cabo ataques de inyección SQL a través de \ (barra invertida) en un mensaje. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2013-4422. • http://www.debian.org/security/2015/dsa-3258 http://www.quassel-irc.org/node/127 http://www.securityfocus.com/bid/74339 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2015-2779
https://notcve.org/view.php?id=CVE-2015-2779
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage. Vulnerabilidad del consumo de la pila en la funcionalidad de la división de mensajes en Quassel anterior a 0.12-rc1 permite a atacantes remotos causar una denegación de servicio (recursión no controlada) a través de un mensaje manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163054.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158666.html http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html http://www.openwall.com/lists/oss-security/2015/03/20/12 http://www.openwall.com/lists/oss-security/2015/03/27/11 http://www.openwall.com/lists/oss-security/2015/03/28/3 http://www.securityfocus.com/bid/74048 https://github.com/quassel/quassel/commit/ • CWE-399: Resource Management Errors •
CVE-2015-2778
https://notcve.org/view.php?id=CVE-2015-2778
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters. Quassel anterior a 0.12-rc1 utiliza un tamaño de tipo de dato incorrecto cuando se divide un mensaje, lo que permite a usuarios remotos causar una denegación de servicio (caída) a través de una consulta CTCP larga conteniendo únicamente caracteres multibyte. • http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html http://www.openwall.com/lists/oss-security/2015/03/20/12 http://www.openwall.com/lists/oss-security/2015/03/27/11 http://www.openwall.com/lists/oss-security/2015/03/28/3 http://www.securityfocus.com/bid/73305 https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 • CWE-399: Resource Management Errors •
CVE-2014-8483
https://notcve.org/view.php?id=CVE-2014-8483
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string. La función blowfishECB en core/cipher.cpp en Quassel IRC 0.10.0 permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango) a través de una cadena malformada. • http://bugs.quassel-irc.org/issues/1314 http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html http://secunia.com/advisories/61932 http://secunia.com/advisories/62035 http://secunia.com/advisories/62261 http://www.debian.org/security/2014/dsa-3063 http://www.debian.org/security/2014/dsa-3068 http://www.ubuntu.com/usn/USN-2401-1 h • CWE-125: Out-of-bounds Read •
CVE-2013-6404
https://notcve.org/view.php?id=CVE-2013-6404
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/. Quassel core (server daemon) en Quassel IRC anteriores a 0.9.2 no verifica correctamente el ID del usuario cuando accede a backlogs de usuario, lo cual permite a usuarios autenticados remotamente leer backlogs de otros usuarios a través del bufferid en (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, y (3) 16/select_buffer_by_id.sql en core/SQL/PostgreSQL/. • http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html http://osvdb.org/100432 http://quassel-irc.org/node/123 http://secunia.com/advisories/55640 http://www.openwall.com/lists/oss-security/2013/11/28/8 https://exchange.xforce.ibmcloud.com/vulnerabilities/89377 https://github.com/quassel/quassel/commit/a1a24da • CWE-264: Permissions, Privileges, and Access Controls •