First published: Mon Dec 13 2021(Updated: )
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toktok Toxcore | >=0.1.9<=0.1.11 | |
Toktok Toxcore | >=0.2.0<=0.2.12 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
>=0.1.9<=0.1.11 | ||
>=0.2.0<=0.2.12 | ||
=34 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.