First published: Thu May 14 2015(Updated: )
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quassel IRC | <=0.12.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3427 is rated as a high-severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2015-3427, upgrade Quassel to version 0.12.2 or later to ensure proper database session handling.
CVE-2015-3427 affects Quassel versions prior to 0.12.2 and Debian Linux 8.0.
CVE-2015-3427 can enable remote attackers to conduct SQL injection attacks by exploiting improper session handling.
There is no specific workaround for CVE-2015-3427; the recommended approach is to apply security updates.