CVE Vulnerabilities

CVE-2021-44847

Incorrect Calculation

Published: Dec 13, 2021 | Modified: Nov 07, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

Weakness

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Affected Software

Name Vendor Start Version End Version
Toxcore Toktok 0.1.9 (including) 0.1.11 (including)
Toxcore Toktok 0.2.0 (including) 0.2.12 (including)
Libtoxcore Ubuntu devel *
Libtoxcore Ubuntu esm-apps/focal *
Libtoxcore Ubuntu focal *
Libtoxcore Ubuntu hirsute *
Libtoxcore Ubuntu impish *
Libtoxcore Ubuntu jammy *
Libtoxcore Ubuntu kinetic *
Libtoxcore Ubuntu lunar *
Libtoxcore Ubuntu mantic *
Libtoxcore Ubuntu noble *
Libtoxcore Ubuntu oracular *
Libtoxcore Ubuntu trusty *
Libtoxcore Ubuntu upstream *
Libtoxcore Ubuntu xenial *

Potential Mitigations

  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).

References