Vuln 1: Title: quasselcore, corruption of heap metadata caused by qdatastream leading to preauth remote code execution. Severity: high, by default the server port is publicly open and the address can be requested using the /WHOIS command of IRC protocol. Description: In Qdatastream protocol each object are prepended with 4 bytes for the object size, this can be used to trigger allocation errors. Vuln 2: Title: quasselcore DDOS Severity: low, impact only a quasselcore not configured. Description: A login attempt causes a NULL pointer dereference because when the database is not initialized. References: https://bugs.gentoo.org/653834 https://www.quassel-irc.org/node/130
Created quassel tracking bugs for this issue: Affects: epel-7 [bug 1573320] Affects: fedora-all [bug 1573319]
The vulnerabilities in this bug report have been assigned CVE numbers as follows: Vuln 1: CVE-2018-1000178 Vuln 2: CVE-2018-1000179 Reference: http://seclists.org/oss-sec/2018/q2/81
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.