First published: Fri Apr 10 2015(Updated: )
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quassel IRC | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2778 is classified as a denial of service vulnerability.
To fix CVE-2015-2778, upgrade to Quassel version 0.12-rc1 or later.
CVE-2015-2778 enables remote attackers to crash the application using a long CTCP query.
Quassel versions prior to 0.12-rc1, specifically up to version 0.11.0, are affected by CVE-2015-2778.
Multibyte characters within a long CTCP query can trigger the vulnerability in CVE-2015-2778.