First published: Mon Dec 13 2021(Updated: )
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toktok Toxcore | >=0.1.9<=0.1.11 | |
Toktok Toxcore | >=0.2.0<=0.2.12 | |
fedoraproject fedora | =34 | |
fedoraproject fedora | =35 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44847 has a medium severity rating due to its potential for remote code execution and system crashes.
To fix CVE-2021-44847, you should upgrade to a patched version of Toxcore, specifically to versions 0.1.12 or 0.2.13 and later.
CVE-2021-44847 affects Toxcore versions 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12.
Yes, CVE-2021-44847 can potentially allow remote attackers to execute arbitrary code, leading to data breaches.
On Fedora systems, the impact of CVE-2021-44847 includes the risk of process crashes or unauthorized code execution when running affected versions.