4.3
CVSSv2

CVE-2012-3461

Published: 20/08/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr prior to 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote malicious users to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

cypherpunks libotr 3.1.0

cypherpunks libotr

Vendor Advisories

Applications using Off-the-Record messaging plugins could be made to crash or run programs if it received specially crafted network messages ...
Debian Bug report logs - #684121 libotr2: Buffer overflows in libotr Package: libotr2; Maintainer for libotr2 is (unknown); Reported by: Göran Weinholt <goran@weinholtse> Date: Tue, 7 Aug 2012 07:45:02 UTC Severity: grave Tags: security, upstream Found in version libotr/320-4 Fixed in versions libotr/321-1, libotr/ ...