DEBIAN-CVE-2013-6404

Source
https://security-tracker.debian.org/tracker/CVE-2013-6404
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-6404.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2013-6404
Upstream
Published
2013-12-09T16:36:47.283Z
Modified
2025-11-19T01:01:56.402428Z
Summary
[none]
Details

Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/selectbufferbyid.sql, (2) 16/selectbufferbyid.sql, and (3) 16/selectbufferby_id.sql in core/SQL/PostgreSQL/.

References

Affected packages

Debian:11 / quassel

Package

Name
quassel
Purl
pkg:deb/debian/quassel?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.2-1

Ecosystem specific

{
    "urgency": "low"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-6404.json"

Debian:12 / quassel

Package

Name
quassel
Purl
pkg:deb/debian/quassel?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.2-1

Ecosystem specific

{
    "urgency": "low"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-6404.json"

Debian:13 / quassel

Package

Name
quassel
Purl
pkg:deb/debian/quassel?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.2-1

Ecosystem specific

{
    "urgency": "low"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-6404.json"

Debian:14 / quassel

Package

Name
quassel
Purl
pkg:deb/debian/quassel?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.2-1

Ecosystem specific

{
    "urgency": "low"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-6404.json"