Vulnerability Details CVE-2021-44847
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.022
EPSS Ranking 83.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2021-44847
-
cpe:2.3:a:toktok:toxcore:0.1.10
-
cpe:2.3:a:toktok:toxcore:0.1.11
-
cpe:2.3:a:toktok:toxcore:0.1.9
-
cpe:2.3:a:toktok:toxcore:0.2.0
-
cpe:2.3:a:toktok:toxcore:0.2.1
-
cpe:2.3:a:toktok:toxcore:0.2.10
-
cpe:2.3:a:toktok:toxcore:0.2.11
-
cpe:2.3:a:toktok:toxcore:0.2.12
-
cpe:2.3:a:toktok:toxcore:0.2.2
-
cpe:2.3:a:toktok:toxcore:0.2.3
-
cpe:2.3:a:toktok:toxcore:0.2.4
-
cpe:2.3:a:toktok:toxcore:0.2.5
-
cpe:2.3:a:toktok:toxcore:0.2.6
-
cpe:2.3:a:toktok:toxcore:0.2.7
-
cpe:2.3:a:toktok:toxcore:0.2.8
-
cpe:2.3:a:toktok:toxcore:0.2.9
-
cpe:2.3:o:fedoraproject:fedora:34
-
cpe:2.3:o:fedoraproject:fedora:35