First published: Mon Jun 13 2016(Updated: )
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
Quassel IRC | <=0.12.3 | |
Fedora | =22 | |
Fedora | =23 | |
Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4414 has a severity rating that indicates it can cause a denial of service due to a NULL pointer dereference.
To fix CVE-2016-4414, upgrade Quassel to version 0.12.4 or later.
CVE-2016-4414 affects all versions of Quassel prior to 0.12.4.
CVE-2016-4414 is caused by the onReadyRead function mishandling invalid handshake data.
CVE-2016-4414 impacts openSUSE Leap 42.1, openSUSE 13.2, and various versions of Fedora including 22, 23, and 24.