CVE-2014-8483

NameCVE-2014-8483
DescriptionThe blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-168-1, DSA-3063-1, DSA-3068-1
Debian Bugs766962, 768191

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
konversation (PTS)buster1.7.5-1fixed
bullseye20.12.1-1fixed
sid, trixie, bookworm22.12.3-1fixed
quassel (PTS)buster1:0.13.1-1+deb10u2fixed
bullseye1:0.13.1-5fixed
bookworm1:0.14.0-1fixed
sid, trixie1:0.14.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
konversationsourcesqueeze1.3.1-2+deb6u1DLA-168-1
konversationsourcewheezy1.4-1+deb7u1DSA-3068-1
konversationsource(unstable)1.5-2768191
quasselsourcesqueeze(not affected)
quasselsourcewheezy0.8.0-1+deb7u3DSA-3063-1
quasselsource(unstable)0.10.0-2.1766962

Notes

[squeeze] - quassel <not-affected> (Problematic code does not exist in 0.6.3-2+squeeze2)
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
http://bugs.quassel-irc.org/issues/1314
https://bugs.kde.org/show_bug.cgi?id=210792

Search for package or bug name: Reporting problems