Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.
References
Link | Resource |
---|---|
https://gitlab.matrix.org/matrix-org/olm/-/releases/3.2.3 | Release Notes Vendor Advisory |
https://matrix.org/blog/2021/06/14/adventures-in-fuzzing-libolm | Exploit Patch Vendor Advisory |
https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | Patch Vendor Advisory |
Configurations
Information
Published : 2021-06-16 11:15
Updated : 2021-06-23 07:29
NVD link : CVE-2021-34813
Mitre link : CVE-2021-34813
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
matrix
- olm