{"id":"CVE-2018-1000178","details":"A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an attacker to execute code remotely.","modified":"2026-04-16T01:42:44.084756306Z","published":"2018-05-08T15:29:00.597Z","related":["openSUSE-SU-2024:11291-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}]}]},"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4594-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00001.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201806-04"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4189"},{"type":"FIX","url":"https://github.com/quassel/quassel/blob/master/src/common/protocols/datastream/datastreampeer.cpp#L62"},{"type":"EVIDENCE","url":"https://i.imgur.com/JJ4QcNq.png"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/quassel/quassel","events":[{"introduced":"0"},{"last_affected":"90183eeb030dd4dda32e4f107e8bcf13f393388d"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:quassel-irc:quassel:0.12.4:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.12.4"}]}}],"versions":["0.10-beta1","0.10-pre","0.10-rc1","0.11-pre","0.11.0","0.12-beta1","0.12-pre","0.12-rc1","0.12.0","0.12.1","0.12.2","0.12.3","0.12.4","0.2.0-pre","0.3.0","0.3.1","0.4.0","0.5-rc1","0.5-rc2","0.5.0","0.6-beta1","0.6-rc1","0.7-beta1","0.7-pre","0.7-rc1","0.8-beta1","0.8-pre","0.8-rc1","0.8.0","0.9-beta1","0.9-pre","0.9-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000178.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}