A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Toxcore | Toktok | 0.1.9 (including) | 0.1.11 (including) |
Toxcore | Toktok | 0.2.0 (including) | 0.2.12 (including) |
Libtoxcore | Ubuntu | devel | * |
Libtoxcore | Ubuntu | esm-apps/focal | * |
Libtoxcore | Ubuntu | focal | * |
Libtoxcore | Ubuntu | hirsute | * |
Libtoxcore | Ubuntu | impish | * |
Libtoxcore | Ubuntu | jammy | * |
Libtoxcore | Ubuntu | kinetic | * |
Libtoxcore | Ubuntu | lunar | * |
Libtoxcore | Ubuntu | mantic | * |
Libtoxcore | Ubuntu | noble | * |
Libtoxcore | Ubuntu | oracular | * |
Libtoxcore | Ubuntu | trusty | * |
Libtoxcore | Ubuntu | upstream | * |
Libtoxcore | Ubuntu | xenial | * |