First published: Fri Apr 10 2015(Updated: )
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quassel IRC | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2779 is classified as a denial of service vulnerability due to potential uncontrolled recursion leading to stack consumption.
To fix CVE-2015-2779, upgrade to Quassel version 0.12-rc1 or later.
CVE-2015-2779 is a stack consumption vulnerability related to message splitting functionality.
Quassel versions prior to 0.12-rc1, including all versions up to and including 0.11.0, are affected by CVE-2015-2779.
Yes, CVE-2015-2779 can be exploited remotely by attackers through crafted messages.