Summary: | <net-irc/quassel-0.7.3 CTCP request Core DoS (CVE-2011-3354) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | patrick, scarabeus, sputnick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.quassel-irc.org/?p=quassel.git;a=commit;h=da215fcb9cd3096a3e223c87577d5d4ab8f8518b | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() Maintainers: Can we stabilize 0.7.3? Amd64 and x86 stable, works on both chroots. Anything else? :) Already stable by Tomas. Adding glsa vote request. Thanks, folks. GLSA Vote: no. NO too. Closing noglsa. CVE-2011-3354 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3354): The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011. |