Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-2851Improper Restriction of Operations within the Bounds of a Memory Buffer in Libotr

Severity
9.8CRITICALNVD
EPSS
23.1%
top 4.06%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 7
Latest updateMay 14

Description

Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/libotr< libotr 4.1.1-1 (bookworm)
Debiancypherpunks/libotr< 4.1.1-1+3
NVDopensuse/leap42.1

Also affects: Debian Linux 7.0, 8.0

🔴Vulnerability Details

2
GHSA
GHSA-p3jg-fm9x-hc9c: Integer overflow in proto2022-05-14
OSV
CVE-2016-2851: Integer overflow in proto2016-04-07

💥Exploits & PoCs

1
Exploit-DB
libotr 4.1.0 - Memory Corruption2016-03-10

📋Vendor Advisories

2
Ubuntu
OTR vulnerability2016-03-10
Debian
CVE-2016-2851: libotr - Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows re...2016

💬Community

5
Bugzilla
CVE-2016-2851 libotr: Integer overflow when receiving messages bigger than 4GB2016-03-09
Bugzilla
CVE-2016-2851 libotr: Integer overflow when receiving messages bigger than 4GB [fedora-all]2016-03-09
Bugzilla
CVE-2016-2851 libotr3: libotr: Integer overflow when receiving messages bigger than 4GB [fedora-all]2016-03-09
Bugzilla
CVE-2016-2851 libotr: Integer overflow when receiving messages bigger than 4GB [epel-all]2016-03-09
Bugzilla
CVE-2016-2851 libotr3: libotr: Integer overflow when receiving messages bigger than 4GB [epel-all]2016-03-09
CVE-2016-2851 — Debian Libotr vulnerability | cvebase