5
CVSSv2

CVE-2011-3354

Published: 04/10/2011 Updated: 29/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel prior to 0.7.3 allows remote malicious users to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.

Vulnerable Product Search on Vulmon Subscribe to Product

quassel-irc quassel 0.7.0

quassel-irc quassel 0.3.0

quassel-irc quassel 0.5.1

quassel-irc quassel 0.5.2

quassel-irc quassel 0.4.1

quassel-irc quassel 0.4.2

quassel-irc quassel 0.7.1

quassel-irc quassel

quassel-irc quassel 0.4.3

quassel-irc quassel 0.5.0

quassel-irc quassel 0.3.1

quassel-irc quassel 0.4.0

quassel-irc quassel 0.6.0

quassel-irc quassel 0.6.1

Vendor Advisories

Debian Bug report logs - #640960 CVE-2011-3354: broken CTCP parsing can be used to crash the core Package: quassel; Maintainer for quassel is Debian KDE Extras Team <pkg-kde-extras@listsaliothdebianorg>; Source for quassel is src:quassel (PTS, buildd, popcon) Reported by: Timo Juhani Lindfors <timolindfors@ikifi> ...