Bug 2735

Summary: CVE-2011-3354: quassel
Product: Mageia Reporter: Nicolas Vigier <boklm>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact:
Severity: normal    
Priority: Normal CC: dmorganec, eeeemail, sysadmin-bugs
Version: 1Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Source RPM: quassel CVE:
Status comment:

Description Nicolas Vigier 2011-09-13 16:24:37 CEST
CtcpParser::packedReply in src/core/ctcpparser.cpp in Quassel does not process
certain CTCP requests correctly, allowing a remote attacker connected to the
same IRC network as the victim to cause a Denial of Service condition by
sending specially crafted CTCP requests. This was demonstrated in various
exploits on freenode.

http://www.openwall.com/lists/oss-security/2011/09/08/7
Comment 1 Nicolas Vigier 2011-09-13 16:25:01 CEST
An update is available in updates_testing.
Comment 2 Manuel Hiebel 2011-09-13 17:19:52 CEST
quassel-0.7.2-1.1.mga1 in the repo

Assignee: bugsquad => qa-bugs

Comment 3 claire robinson 2011-09-13 18:04:31 CEST
There is testing info here - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640960

I use quassel does somebody want to test (please let me know first!) then I'll update and try the same again.

CC: (none) => eeeemail

Comment 4 claire robinson 2011-09-14 12:11:00 CEST
Is anybody able to interpret that into a workable ctcp?
Comment 5 claire robinson 2011-09-14 13:16:50 CEST
Also more info here - https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/629774
Comment 6 claire robinson 2011-09-16 14:32:49 CEST
Not being able to reproduce the crash, I've tested functionality and quassel shows no regressions i586.

Requires x86_64 testing still.
Comment 7 claire robinson 2011-09-16 15:06:19 CEST
Basic testing x86_64 complete.

Validated Update.

Advisory:


-----------------

Quassel does not process certain CTCP requests correctly, allowing a remote attacker connected to the same IRC network as the victim to cause a Denial of Service condition by sending specially crafted CTCP requests. This was demonstrated in various exploits on freenode.

http://www.openwall.com/lists/oss-security/2011/09/08/7

This update provides a fix.

-----------------

SRPM: quassel-0.7.2-1.2.mga1.src.rpm 


Could sysadmin please push from core/updates_testing to core/updates.


Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 8 D Morgan 2011-09-18 02:59:53 CEST
update pushed.

Status: NEW => RESOLVED
CC: (none) => dmorganec
Resolution: (none) => FIXED