CVE Vulnerabilities

CVE-2021-44847

Incorrect Calculation

Published: Dec 13, 2021 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

Weakness

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Affected Software

NameVendorStart VersionEnd Version
ToxcoreToktok0.1.9 (including)0.1.11 (including)
ToxcoreToktok0.2.0 (including)0.2.12 (including)
LibtoxcoreUbuntudevel*
LibtoxcoreUbuntuesm-apps/focal*
LibtoxcoreUbuntuesm-apps/jammy*
LibtoxcoreUbuntuesm-apps/noble*
LibtoxcoreUbuntufocal*
LibtoxcoreUbuntuhirsute*
LibtoxcoreUbuntuimpish*
LibtoxcoreUbuntujammy*
LibtoxcoreUbuntukinetic*
LibtoxcoreUbuntulunar*
LibtoxcoreUbuntumantic*
LibtoxcoreUbuntunoble*
LibtoxcoreUbuntuoracular*
LibtoxcoreUbuntuplucky*
LibtoxcoreUbuntuquesting*
LibtoxcoreUbuntutrusty*
LibtoxcoreUbuntuupstream*
LibtoxcoreUbuntuxenial*

Potential Mitigations

  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).

References