CVE-2012-3461

NameCVE-2012-3461
DescriptionThe (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2526-1
NVD severitymedium (attack range: remote)
Debian Bugs684121
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libotr (PTS)squeeze (security), squeeze3.2.0-2+squeeze1fixed
wheezy3.2.1-1+deb7u1fixed
jessie, sid4.1.0-2fixed

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libotrsource(unstable)3.2.1-1medium684121
libotrsourcesqueeze3.2.0-2+squeeze1mediumDSA-2526-1

Search for package or bug name: Reporting problems