CVE-2012-3461
Published: 10 August 2012
The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
libotr Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(3.2.0-2ubuntu0.1)
|
|
natty |
Released
(3.2.0-2ubuntu1.1)
|
|
oneiric |
Released
(3.2.0-2.1ubuntu0.1)
|
|
precise |
Released
(3.2.0-4ubuntu0.1)
|
|
upstream |
Released
(3.2.1-1)
|
|
Patches: upstream: http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr;a=commitdiff;h=b17232f86f8e60d0d22caf9a2400494d3c77da58 upstream: http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr;a=commitdiff;h=6d4ca89cf1d3c9a8aff696c3a846ac5a51f762c1 upstream: http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr;a=commitdiff;h=1902baee5d4b056850274ed0fa8c2409f1187435 |