vulnerability
SUSE: CVE-2021-44847: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Dec 13, 2021 | Dec 31, 2021 | Oct 26, 2022 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 13, 2021
Added
Dec 31, 2021
Modified
Oct 26, 2022
Description
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Solutions
suse-upgrade-c-toxcoresuse-upgrade-c-toxcore-daemonsuse-upgrade-c-toxcore-develsuse-upgrade-libtoxcore2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.