Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2016-2851 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Libotr
CWE-119 — Improper Restriction of Operations within the Bounds of a Memory Buffer11 documents7 sources
Severity
9.8CRITICALNVD
EPSS
23.1%
top 4.06%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 7
Latest updateMay 14
Description
Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 7.0, 8.0
🔴Vulnerability Details
2💥Exploits & PoCs
1📋Vendor Advisories
2💬Community
5Bugzilla▶
CVE-2016-2851 libotr: Integer overflow when receiving messages bigger than 4GB [fedora-all]↗2016-03-09
Bugzilla▶
CVE-2016-2851 libotr3: libotr: Integer overflow when receiving messages bigger than 4GB [fedora-all]↗2016-03-09
Bugzilla▶
CVE-2016-2851 libotr: Integer overflow when receiving messages bigger than 4GB [epel-all]↗2016-03-09
Bugzilla▶
CVE-2016-2851 libotr3: libotr: Integer overflow when receiving messages bigger than 4GB [epel-all]↗2016-03-09