A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
References
Link | Resource |
---|---|
https://github.com/TokTok/c-toxcore/pull/1718 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7EBS3NIRYJ7V3PTNINP3PJSVUHGZTGA/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLTKINSPO5T65LB3ZASDPCREKUE22RYE/ | Mailing List Third Party Advisory |
Information
Published : 2021-12-12 17:15
Updated : 2022-02-08 10:55
NVD link : CVE-2021-44847
Mitre link : CVE-2021-44847
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
toktok
- toxcore
fedoraproject
- fedora