Debian Libtoxcore vulnerabilities

3 known vulnerabilities affecting debian/libtoxcore.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1LOW1

Vulnerabilities

Page 1 of 1
CVE-2021-44847CRITICALCVSS 9.8fixed in libtoxcore 0.2.13-1 (bookworm)2021
CVE-2021-44847 [CRITICAL] CVE-2021-44847: libtoxcore - A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1... A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet. Scope: local bookworm: resolved (fixed in
debian
CVE-2018-25021HIGHCVSS 7.5fixed in libtoxcore 0.2.8-1 (bookworm)2018
CVE-2018-25021 [HIGH] CVE-2018-25021: libtoxcore - The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queu... The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queue under certain conditions, which allows a remote attacker to exhaust the system's memory, causing a denial of service (DoS). Scope: local bookworm: resolved (fixed in 0.2.8-1) bullseye: resolved (fixed in 0.2.8-1) forky: resolved (fixed in 0.2.8-1) sid: resolved (fixed in 0.2.8-1) tr
debian
CVE-2018-25022LOWCVSS 3.1fixed in libtoxcore 0.2.2-1 (bookworm)2018
CVE-2018-25022 [LOW] CVE-2018-25022: libtoxcore - The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be o... The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and
debian