vulnerability
FreeBSD: VID-499f6b41-58db-4f98-b8e7-da8c18985eda: quassel -- multiple vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Apr 26, 2018 | Apr 27, 2018 | Dec 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 26, 2018
Added
Apr 27, 2018
Modified
Dec 10, 2025
Description
Gentoo reports: quasselcore: corruption of heap metadata caused by qdatastream leading to preauth remote code execution. Severity: high, by default the server port is publicly open and the address can be requested using the /WHOIS command of IRC protocol. Description: In Qdatastream protocol each object is prepended with 4 bytes for the object size, this can be used to trigger allocation errors. quasselcore DDOS Severity: low, only impacts unconfigured quasselcore instances. Description: A login attempt causes a NULL pointer dereference when the database is not initialized.
Solutions
freebsd-upgrade-package-quasselfreebsd-upgrade-package-quassel-core
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.