CVE-2015-8547
Summary
| CVE | CVE-2015-8547 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-01-08 19:59:00 UTC |
| Updated | 2018-10-30 16:27:00 UTC |
| Description | The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query. |
Risk And Classification
Problem Types: CWE-17
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Opensuse | Leap | 42.1 | All | All | All |
| Operating System | Opensuse | Leap | 42.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.2 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.2 | All | All | All |
| Application | Quassel-irc | Quassel | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 22 Update: quassel-0.12.2-6.fc22 | FEDORA | lists.fedoraproject.org | |
| openSUSE-SU-2015:2345-1: moderate: Security update for quassel | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 23 Update: quassel-0.12.2-6.fc23 | FEDORA | lists.fedoraproject.org | |
| oss-security - Re: CVE request: Remote DoS in Quassel | MLIST | www.openwall.com | |
| Fixes a crash of the core when executing "/op *" in a query. by elxa · Pull Request #153 · quassel/quassel · GitHub | CONFIRM | github.com | |
| Merge pull request #153 from elxa/fix-op-command-crashing-core · quassel/quassel@b8edbda · GitHub | CONFIRM | github.com | Vendor Advisory |
| oss-security - CVE request: Remote DoS in Quassel | MLIST | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.