vulnerability

FreeBSD: VID-499f6b41-58db-4f98-b8e7-da8c18985eda: quassel -- multiple vulnerabilities

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 26, 2018
Added
Apr 27, 2018
Modified
Dec 10, 2025

Description

Gentoo reports: quasselcore: corruption of heap metadata caused by qdatastream leading to preauth remote code execution. Severity: high, by default the server port is publicly open and the address can be requested using the /WHOIS command of IRC protocol. Description: In Qdatastream protocol each object is prepended with 4 bytes for the object size, this can be used to trigger allocation errors. quasselcore DDOS Severity: low, only impacts unconfigured quasselcore instances. Description: A login attempt causes a NULL pointer dereference when the database is not initialized.

Solutions

freebsd-upgrade-package-quasselfreebsd-upgrade-package-quassel-core

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.