Описание
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| devel | released | 0.2.13-1 |
| esm-apps/focal | needed | |
| esm-apps/jammy | released | 0.2.13-1 |
| esm-apps/noble | released | 0.2.13-1 |
| focal | ignored | end of standard support, was needed |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
| jammy | released | 0.2.13-1 |
| kinetic | released | 0.2.13-1 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
A stack-based buffer overflow in handle_request function in DHT.c in t ...
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3