Описание
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.12.2-0ubuntu0.1 |
| esm-apps/xenial | released | 0.12.2-0ubuntu0.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.10.0-0ubuntu2.2]] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 0.10.0-0ubuntu2.2 |
| trusty/esm | DNE | trusty was released [0.10.0-0ubuntu2.2] |
| upstream | released | 1:0.10.0-2.3 |
| utopic | released | 0.10.1-0ubuntu1.2 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
Quassel before 0.12-rc1 uses an incorrect data-type size when splittin ...
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
EPSS
5 Medium
CVSS2