Bug 2735 - CVE-2011-3354: quassel
Summary: CVE-2011-3354: quassel
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard:
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2011-09-13 16:24 CEST by Nicolas Vigier
Modified: 2011-09-18 02:59 CEST (History)
3 users (show)

See Also:
Source RPM: quassel
CVE:
Status comment:


Attachments

Description Nicolas Vigier 2011-09-13 16:24:37 CEST
CtcpParser::packedReply in src/core/ctcpparser.cpp in Quassel does not process
certain CTCP requests correctly, allowing a remote attacker connected to the
same IRC network as the victim to cause a Denial of Service condition by
sending specially crafted CTCP requests. This was demonstrated in various
exploits on freenode.

http://www.openwall.com/lists/oss-security/2011/09/08/7
Comment 1 Nicolas Vigier 2011-09-13 16:25:01 CEST
An update is available in updates_testing.
Comment 2 Manuel Hiebel 2011-09-13 17:19:52 CEST
quassel-0.7.2-1.1.mga1 in the repo

Assignee: bugsquad => qa-bugs

Comment 3 claire robinson 2011-09-13 18:04:31 CEST
There is testing info here - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640960

I use quassel does somebody want to test (please let me know first!) then I'll update and try the same again.

CC: (none) => eeeemail

Comment 4 claire robinson 2011-09-14 12:11:00 CEST
Is anybody able to interpret that into a workable ctcp?
Comment 5 claire robinson 2011-09-14 13:16:50 CEST
Also more info here - https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/629774
Comment 6 claire robinson 2011-09-16 14:32:49 CEST
Not being able to reproduce the crash, I've tested functionality and quassel shows no regressions i586.

Requires x86_64 testing still.
Comment 7 claire robinson 2011-09-16 15:06:19 CEST
Basic testing x86_64 complete.

Validated Update.

Advisory:


-----------------

Quassel does not process certain CTCP requests correctly, allowing a remote attacker connected to the same IRC network as the victim to cause a Denial of Service condition by sending specially crafted CTCP requests. This was demonstrated in various exploits on freenode.

http://www.openwall.com/lists/oss-security/2011/09/08/7

This update provides a fix.

-----------------

SRPM: quassel-0.7.2-1.2.mga1.src.rpm 


Could sysadmin please push from core/updates_testing to core/updates.


Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 8 D Morgan 2011-09-18 02:59:53 CEST
update pushed.

Status: NEW => RESOLVED
CC: (none) => dmorganec
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.