Name | CVE-2014-8483 |
Description | The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-168-1, DSA-3063-1, DSA-3068-1 |
Debian Bugs | 766962, 768191 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
konversation (PTS) | bullseye | 20.12.1-1 | fixed |
| sid, trixie, bookworm | 22.12.3-1 | fixed |
quassel (PTS) | bullseye | 1:0.13.1-5 | fixed |
| bookworm | 1:0.14.0-1 | fixed |
| sid, trixie | 1:0.14.0-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - quassel <not-affected> (Problematic code does not exist in 0.6.3-2+squeeze2)
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
http://bugs.quassel-irc.org/issues/1314
https://bugs.kde.org/show_bug.cgi?id=210792