CVE-2013-6404
Summary
| CVE | CVE-2013-6404 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-12-09 16:36:00 UTC |
| Updated | 2017-08-29 01:33:00 UTC |
| Description | Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Quassel-irc | Quassel Irc | 0.9.0 | All | All | All |
| Application | Quassel-irc | Quassel Irc | All | All | All | All |
| Application | Quassel-irc | Quassel Irc | 0.9.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| openSUSE-SU-2013:1929-1: moderate: update for quassel | SUSE | lists.opensuse.org | |
| Security Advisory SA55640 - Quassel IRC Backlog Access Bypass Vulnerabilities - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Yet Another Important Update: Quassel 0.9.2 | Quassel IRC | CONFIRM | quassel-irc.org | Patch, Vendor Advisory |
| Make sure that clients can't access buffers belonging to other users · quassel/quassel@a1a24da · GitHub | CONFIRM | github.com | Exploit, Patch |
| oss-security - Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core | MLIST | www.openwall.com | |
| openSUSE-SU-2014:0114-1: moderate: update for quassel | SUSE | lists.opensuse.org | |
| 100432 | OSVDB | osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.