[arch-security] [ASA-201605-5] quassel-core: denial of service
Christian Rebischke
Chris.Rebischke at archlinux.org
Thu May 5 13:30:04 UTC 2016
Arch Linux Security Advisory ASA-201605-5
=========================================
Severity: Medium
Date : 2016-05-05
CVE-ID : CVE-2016-4414
Package : quassel-core
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package quassel-core before version 0.12.4-1 is vulnerable to denial of
service attack by unauthenticated clients.
Resolution
==========
Upgrade to 0.12.4-1.
# pacman -Syu "quassel-core>=0.12.4-1"
The problem has been fixed upstream in version 0.12.4.
Workaround
==========
None.
Description
===========
- CVE-2016-4414 (denial of service)
It was found that quasselcore is vulnerable to a denial of service attack by
unauthenticated clients. The protocol negotiation did not take into account
lack of a match, in which case PeerFactory::createPeer returns a nullptr,
which is immediately dereferenced.
Impact
======
A remote attacker is able to crash the quassel-core with an unauthenticated
client.
References
==========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4414
https://marc.info/?l=oss-security&m=146204310020229&w=2
https://github.com/quassel/quassel/commit/e67887343c433cc35bc26ad6a9392588f427e746
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160505/85d80543/attachment.asc>
More information about the arch-security
mailing list