Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-34813

Опубликовано: 16 июн. 2021
Источник: debian
EPSS Низкий

Описание

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
olmfixed3.2.3~dfsg-1experimentalpackage
olmfixed3.2.3~dfsg-3package
olmno-dsabullseyepackage
olmno-dsabusterpackage

Примечания

  • https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b

  • https://gitlab.matrix.org/matrix-org/olm/-/releases/3.2.3

  • https://matrix.org/blog/2021/06/14/adventures-in-fuzzing-libolm

EPSS

Процентиль: 89%
0.04458
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 4 лет назад

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

CVSS3: 9.8
nvd
больше 4 лет назад

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

github
больше 3 лет назад

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость реализации криптографической трещотки Double Ratchet Libolm, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 89%
0.04458
Низкий
Уязвимость CVE-2021-34813