First published: Tue Oct 20 2020(Updated: )
It was discovered that Quassel incorrectly handled Qdatastream protocol. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-1000178) It was discovered that Quassel incorrectly handled certain login requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-1000179)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/quassel | <1:0.12.4-3ubuntu1.18.04.3 | 1:0.12.4-3ubuntu1.18.04.3 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/quassel-core | <1:0.12.4-3ubuntu1.18.04.3 | 1:0.12.4-3ubuntu1.18.04.3 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4594-1 is categorized as a high severity vulnerability, allowing remote code execution.
To fix USN-4594-1, upgrade the Quassel package to version 1:0.12.4-3ubuntu1.18.04.3 or later.
USN-4594-1 affects Ubuntu 18.04 users running the Quassel and Quassel-core packages.
Yes, USN-4594-1 is associated with CVE-2018-1000178 and CVE-2018-1000179.
Not addressing USN-4594-1 could allow an attacker to execute arbitrary code on the affected system.