Vulnerability Description
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quassel-Irc | Quassel | <= 0.12.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3258
- http://www.quassel-irc.org/node/127Vendor Advisory
- http://www.securityfocus.com/bid/74339
- http://www.debian.org/security/2015/dsa-3258
- http://www.quassel-irc.org/node/127Vendor Advisory
- http://www.securityfocus.com/bid/74339
FAQ
What is CVE-2015-3427?
CVE-2015-3427 is a vulnerability with a CVSS score of 7.5 (HIGH). Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash)...
How severe is CVE-2015-3427?
CVE-2015-3427 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3427?
Check the references section above for vendor advisories and patch information. Affected products include: Quassel-Irc Quassel, Debian Debian Linux.