First published: Thu Nov 06 2014(Updated: )
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Debian | =7.0 | |
Quassel IRC | =0.10.0 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8483 has a severity rating that indicates it can lead to denial of service due to an out-of-bounds read.
To fix CVE-2014-8483, update Quassel IRC to a version higher than 0.10.0 or apply relevant patches provided by the maintainers.
CVE-2014-8483 affects Quassel IRC version 0.10.0, Ubuntu 12.04, Debian 7.0, and specific versions of openSUSE.
Attackers exploiting CVE-2014-8483 can cause a denial of service by sending a malformed string to the application.
Yes, CVE-2014-8483 can be exploited remotely, allowing attackers to manipulate the target application without physical access.