CRLF injection vulnerability in Quassel Core before 0.3.0.3 allows remote attackers to spoof IRC messages as other users via a crafted CTCP message.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/32470 | third party advisory |
http://www.securityfocus.com/archive/1/497884 | mailing list |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46195 | vdb entry |
http://www.securityfocus.com/archive/1/497882/30/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/3164 | vdb entry |
http://wouter.coekaerts.be/site/security/quassel-ctcp | |
http://quassel-irc.org/node/89 | patch vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00354.html | vendor advisory |
http://secunia.com/advisories/32692 | third party advisory |
http://www.securityfocus.com/bid/31973 | vdb entry |