CVE-2014-8483

The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
References
Link Resource
http://bugs.quassel-irc.org/issues/1314 Issue Tracking Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html Third Party Advisory
http://secunia.com/advisories/61932 Permissions Required Third Party Advisory
http://secunia.com/advisories/62035 Permissions Required Third Party Advisory
http://secunia.com/advisories/62261 Permissions Required Third Party Advisory
http://www.debian.org/security/2014/dsa-3063 Third Party Advisory
http://www.debian.org/security/2014/dsa-3068 Third Party Advisory
http://www.ubuntu.com/usn/USN-2401-1 Third Party Advisory
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 Issue Tracking Patch
http://bugs.quassel-irc.org/issues/1314 Issue Tracking Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html Third Party Advisory
http://secunia.com/advisories/61932 Permissions Required Third Party Advisory
http://secunia.com/advisories/62035 Permissions Required Third Party Advisory
http://secunia.com/advisories/62261 Permissions Required Third Party Advisory
http://www.debian.org/security/2014/dsa-3063 Third Party Advisory
http://www.debian.org/security/2014/dsa-3068 Third Party Advisory
http://www.ubuntu.com/usn/USN-2401-1 Third Party Advisory
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:quassel-irc:quassel_irc:0.10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://bugs.quassel-irc.org/issues/1314 - Issue Tracking, Vendor Advisory () http://bugs.quassel-irc.org/issues/1314 - Issue Tracking, Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html - Third Party Advisory
References () http://secunia.com/advisories/61932 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/61932 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/62035 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/62035 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/62261 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/62261 - Permissions Required, Third Party Advisory
References () http://www.debian.org/security/2014/dsa-3063 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3063 - Third Party Advisory
References () http://www.debian.org/security/2014/dsa-3068 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3068 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2401-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2401-1 - Third Party Advisory
References () https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 - Patch, Issue Tracking () https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 - Issue Tracking, Patch

Information

Published : 2014-11-06 15:55

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8483

Mitre link : CVE-2014-8483

CVE.ORG link : CVE-2014-8483


JSON object : View

Products Affected

canonical

  • ubuntu_linux

opensuse

  • opensuse

debian

  • debian_linux

quassel-irc

  • quassel_irc
CWE
CWE-125

Out-of-bounds Read