A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
References
| Link | Resource |
|---|---|
| https://github.com/TokTok/c-toxcore/pull/1718 | Exploit Issue Tracking Patch Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7EBS3NIRYJ7V3PTNINP3PJSVUHGZTGA/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLTKINSPO5T65LB3ZASDPCREKUE22RYE/ | Mailing List Third Party Advisory |
Information
Published : 2021-12-13 01:15
Updated : 2023-08-08 14:21
NVD link : CVE-2021-44847
Mitre link : CVE-2021-44847
JSON object : View
Products Affected
toktok
- toxcore
fedoraproject
- fedora
CWE
CWE-682
Incorrect Calculation
