svn commit: r468346 - head/security/vuxml
Ben Woods
woodsb02 at FreeBSD.org
Thu Apr 26 11:00:40 UTC 2018
Author: woodsb02
Date: Thu Apr 26 11:00:39 2018
New Revision: 468346
URL: https://svnweb.freebsd.org/changeset/ports/468346
Log:
Document vulnerabilities in quassel before 0.12.5
Security: https://vuxml.freebsd.org/freebsd/499f6b41-58db-4f98-b8e7-da8c18985eda.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Apr 26 10:25:56 2018 (r468345)
+++ head/security/vuxml/vuln.xml Thu Apr 26 11:00:39 2018 (r468346)
@@ -58,6 +58,53 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="499f6b41-58db-4f98-b8e7-da8c18985eda">
+ <topic>quassel -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>quassel</name>
+ <range><lt>0.12.5</lt></range>
+ </package>
+ <package>
+ <name>quassel-core</name>
+ <range><lt>0.12.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gentoo reports:</p>
+ <blockquote cite="https://bugs.gentoo.org/653834">
+ <p>quasselcore: corruption of heap metadata caused by qdatastream
+ leading to preauth remote code execution.</p>
+ <ul>
+ <li>Severity: high, by default the server port is publicly open
+ and the address can be requested using the /WHOIS command of IRC
+ protocol.</li>
+ <li>Description: In Qdatastream protocol each object is prepended
+ with 4 bytes for the object size, this can be used to trigger
+ allocation errors.</li>
+ </ul>
+ <p>quasselcore DDOS</p>
+ <ul>
+ <li>Severity: low, only impacts unconfigured quasselcore
+ instances.</li>
+ <li>Description: A login attempt causes a NULL pointer dereference
+ when the database is not initialized.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugs.gentoo.org/653834</url>
+ <url>https://github.com/quassel/quassel/commit/08bace4e9ecf08273f094c0c6aa8b3363d38ac3e</url>
+ <url>https://github.com/quassel/quassel/commit/18389a713a6810f57ab237b945e8ee03df857b8b</url>
+ </references>
+ <dates>
+ <discovery>2018-04-24</discovery>
+ <entry>2018-04-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="36ff7a74-47b1-11e8-a7d6-54e1ad544088">
<topic>chromium -- vulnerability</topic>
<affects>
More information about the svn-ports-all
mailing list