Lucene search

K
mageiaGentoo FoundationMGASA-2014-0436
HistoryOct 29, 2014 - 2:30 p.m.

Updated quassel packages fix security vulnerability

2014-10-2914:30:40
Gentoo Foundation
advisories.mageia.org
8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.034 Low

EPSS

Percentile

91.5%

Due to and out-of-bounds read issue in Quassel core in The ECB Blowfish decryption function, a malicious client can cause either denial of service or disclosure of information from process memory by using an improperly formed message (CVE-2014-8483).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchquassel< 0.9.2-1.1quassel-0.9.2-1.1.mga3
Mageia4noarchquassel< 0.9.2-1.1quassel-0.9.2-1.1.mga4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.034 Low

EPSS

Percentile

91.5%