Debian Quassel vulnerabilities
14 known vulnerabilities affecting debian/quassel.
Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
1
Severity breakdown
CRITICAL1HIGH5MEDIUM6LOW2
Vulnerabilities
Page 1 of 1
CVE-2021-34825HIGHCVSS 7.5fixed in quassel 1:0.14.0-1 (bookworm)2021
CVE-2021-34825 [HIGH] CVE-2021-34825: quassel - Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or T...
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
Scope: local
bookworm: resolved (fixed in 1:0.14.0-1)
bullseye: open
forky: resolved (fixed in 1:0.14.0-1)
sid: resolved (fixed in 1:0.14.0-1)
trixie: resolved (fixed in 1:0.14.0-1)
debian
CVE-2018-1000178CRITICALCVSS 9.8fixed in quassel 1:0.12.5-1 (bookworm)2018
CVE-2018-1000178 [CRITICAL] CVE-2018-1000178: quassel - A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcor...
A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an attacker to execute code remotely.
Scope: local
bookworm: resolved (fixed in 1:0.12.5-1)
bullseye: resolved (fixed in 1:0.12.5-1)
forky: resolved (fixed in 1:0.12.5-1)
sid: r
debian
CVE-2018-1000179HIGHCVSS 7.5fixed in quassel 1:0.12.5-1 (bookworm)2018
CVE-2018-1000179 [HIGH] CVE-2018-1000179: quassel - A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 in the qu...
A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 in the quasselcore void CoreAuthHandler::handle(const Login &msg) coreauthhandler.cpp line 235 that allows an attacker to cause a denial of service.
Scope: local
bookworm: resolved (fixed in 1:0.12.5-1)
bullseye: resolved (fixed in 1:0.12.5-1)
forky: resolved (fixed in 1:0.12.5-1)
sid: resolv
debian
CVE-2016-4414HIGHCVSS 7.5fixed in quassel 1:0.12.4-2 (bookworm)2016
CVE-2016-4414 [HIGH] CVE-2016-4414: quassel - The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 al...
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
Scope: local
bookworm: resolved (fixed in 1:0.12.4-2)
bullseye: resolved (fixed in 1:0.12.4-2)
forky: resolved (fixed in 1:0.12.4-2)
sid: resolved (fixed in 1:0.12.4-2)
trixi
debian
CVE-2015-8547HIGHCVSS 7.5fixed in quassel 1:0.12.2-3 (bookworm)2015
CVE-2015-8547 [HIGH] CVE-2015-8547: quassel - The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Qu...
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
Scope: local
bookworm: resolved (fixed in 1:0.12.2-3)
bullseye: resolved (fixed in 1:0.12.2-3)
forky: resolved (fixed in 1:0.12.2-3)
sid: resolved (fixed in 1:0.12.2-3)
debian
CVE-2015-2778MEDIUMCVSS 5.0fixed in quassel 1:0.10.0-2.3 (bookworm)2015
CVE-2015-2778 [MEDIUM] CVE-2015-2778: quassel - Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a messag...
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
Scope: local
bookworm: resolved (fixed in 1:0.10.0-2.3)
bullseye: resolved (fixed in 1:0.10.0-2.3)
forky: resolved (fixed in 1:0.10.0-2.3)
sid: resolved (fixe
debian
CVE-2015-3427MEDIUMCVSS 6.8fixed in quassel 1:0.10.0-2.4 (bookworm)2015
CVE-2015-3427 [MEDIUM] CVE-2015-3427: quassel - Quassel before 0.12.2 does not properly re-initialize the database session when ...
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
Scope: local
bookworm: resolved (fixed in 1:0.10.0-2.4)
bullseye: resolve
debian
CVE-2015-2779MEDIUMCVSS 5.0fixed in quassel 1:0.10.0-2.3 (bookworm)2015
CVE-2015-2779 [MEDIUM] CVE-2015-2779: quassel - Stack consumption vulnerability in the message splitting functionality in Quasse...
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
Scope: local
bookworm: resolved (fixed in 1:0.10.0-2.3)
bullseye: resolved (fixed in 1:0.10.0-2.3)
forky: resolved (fixed in 1:0.10.0-2.3)
sid: resolved (fixed in 1:0.10
debian
CVE-2014-8483MEDIUMCVSS 5.0fixed in konversation 1.5-2 (bookworm)2014
CVE-2014-8483 [MEDIUM] CVE-2014-8483: konversation - The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote ...
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
Scope: local
bookworm: resolved (fixed in 1.5-2)
bullseye: resolved (fixed in 1.5-2)
forky: resolved (fixed in 1.5-2)
sid: resolved (fixed in 1.5-2)
trixie: resolved (fixed in 1.5-2)
debian
CVE-2013-4422MEDIUMCVSS 6.8fixed in quassel 0.9.1-1 (bookworm)2013
CVE-2013-4422 [MEDIUM] CVE-2013-4422: quassel - SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later ...
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
Scope: local
bookworm: resolved (fixed in 0.9.1-1)
bullseye: resolved (fixed in 0.9.1-1)
forky: resolved (fixed in 0.9.1-1)
sid: resolved (fixed in 0.9.1-1)
t
debian
CVE-2013-6404LOWCVSS 4.0fixed in quassel 0.9.2-1 (bookworm)2013
CVE-2013-6404 [MEDIUM] CVE-2013-6404: quassel - Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verif...
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
Scope: local
bookworm: resolve
debian
CVE-2011-3354LOWCVSS 5.0Exploitedfixed in quassel 0.7.3-1 (bookworm)2011
CVE-2011-3354 [MEDIUM] CVE-2011-3354: quassel - The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7....
The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.
Scope: local
bookworm: resolved (fixed in 0.7.3-1)
bullseye: resolved (fixed in 0.7.3-1)
forky: resolved (fixed in 0.7.3-1
debian
CVE-2010-3443MEDIUMCVSS 5.0fixed in quassel 0.7.1-1 (bookworm)2010
CVE-2010-3443 [MEDIUM] CVE-2010-3443: quassel - ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote att...
ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message.
Scope: local
bookworm: resolved (fixed in 0.7.1-1)
bullseye: resolved (fixed in 0.7.1-1)
forky: resolved (fixed in 0.7.1-1)
sid: resolved (fixed in 0.7.1-1)
debian
CVE-2008-5657HIGHCVSS 7.5fixed in quassel 0.2~rc1-1.1 (bookworm)2008
CVE-2008-5657 [HIGH] CVE-2008-5657: quassel - CRLF injection vulnerability in Quassel Core before 0.3.0.3 allows remote attack...
CRLF injection vulnerability in Quassel Core before 0.3.0.3 allows remote attackers to spoof IRC messages as other users via a crafted CTCP message.
Scope: local
bookworm: resolved (fixed in 0.2~rc1-1.1)
bullseye: resolved (fixed in 0.2~rc1-1.1)
forky: resolved (fixed in 0.2~rc1-1.1)
sid: resolved (fixed in 0.2~rc1-1.1)
trixie: resolved (fixed in 0.2~rc1-1.1)
debian