Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44847

Опубликовано: 13 дек. 2021
Источник: debian
EPSS Низкий

Описание

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libtoxcorefixed0.2.13-1package
libtoxcoreno-dsabullseyepackage
libtoxcoreno-dsabusterpackage

Примечания

  • https://github.com/TokTok/c-toxcore/pull/1718

  • https://blog.tox.chat/2021/12/stack-based-buffer-overflow-vulnerability-in-udp-packet-handling-in-toxcore-cve-2021-44847/

  • Introduced by: https://github.com/TokTok/c-toxcore/commit/71260e38e8d12547b0e55916daf6cadd72f52e19 (v0.1.9)

  • Fixed by: https://github.com/TokTok/c-toxcore/commit/1b02bad36864fdfc36694e3f96d2dc6c58a891e4 (v0.2.13)

EPSS

Процентиль: 88%
0.03957
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 4 лет назад

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

CVSS3: 9.8
nvd
около 4 лет назад

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

suse-cvrf
около 4 лет назад

Security update for c-toxcore

CVSS3: 9.8
github
около 4 лет назад

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

EPSS

Процентиль: 88%
0.03957
Низкий