First published: Mon Dec 09 2013(Updated: )
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quassel IRC | <=0.9.1 | |
Quassel IRC | =0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6404 is rated as a medium severity vulnerability due to improper user ID verification leading to unauthorized access.
To fix CVE-2013-6404, upgrade Quassel IRC to version 0.9.2 or later, which addresses the user ID verification issue.
Quassel IRC versions prior to 0.9.2, specifically 0.9.0 and 0.9.1, are affected by CVE-2013-6404.
CVE-2013-6404 can be exploited by remote authenticated users to read other users' backlogs without authorization.
There is no documented workaround for CVE-2013-6404, so upgrading to a secure version is necessary.