9.8
CVSSv3

CVE-2021-44847

Published: 13/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 up to and including 0.1.11 and 0.2.0 up to and including 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote malicious users to crash the process or potentially execute arbitrary code via a network packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

toktok toxcore

fedoraproject fedora 34

fedoraproject fedora 35

Vendor Advisories

Debian Bug report logs - #1001711 libtoxcore2: Stack-based buffer overflow vulnerability in UDP packet handling in Toxcore (CVE-2021-44847) Package: libtoxcore2; Maintainer for libtoxcore2 is Yangfl <mmyangfl@gmailcom>; Source for libtoxcore2 is src:libtoxcore (PTS, buildd, popcon) Reported by: Vincas Dargis <vindrg@gmai ...
A stack-based buffer overflow in handle_request function in DHTc in toxcore before version 0213 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet ...