CVE-2021-44847Incorrect Calculation in Toxcore

Severity
9.8CRITICALNVD
EPSS
3.9%
top 11.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 13
Latest updateDec 14

Description

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

debiandebian/libtoxcore< libtoxcore 0.2.13-1 (bookworm)
NVDtoktok/toxcore0.1.90.1.11+1

Also affects: Fedora 34, 35

Patches

🔴Vulnerability Details

2
GHSA
GHSA-62pr-4hg6-fwph: A stack-based buffer overflow in handle_request function in DHT2021-12-14
OSV
CVE-2021-44847: A stack-based buffer overflow in handle_request function in DHT2021-12-13

📋Vendor Advisories

1
Debian
CVE-2021-44847: libtoxcore - A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1...2021
CVE-2021-44847 — Incorrect Calculation in Toxcore | cvebase