Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3427

Опубликовано: 14 мая 2015
Источник: debian

Описание

Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
quasselfixed1:0.10.0-2.4package
quasselnot-affectedwheezypackage
quasselnot-affectedsqueezepackage

Примечания

  • https://github.com/quassel/quassel/commit/6605882f41331c80f7ac3a6992650a702ec71283

  • http://quassel-irc.org/node/120

Связанные уязвимости

ubuntu
больше 10 лет назад

Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.

nvd
больше 10 лет назад

Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.

github
больше 3 лет назад

Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.