CVE-2012-3461

NameCVE-2012-3461
DescriptionThe (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2526-1
NVD severitymedium (attack range: remote)
Debian Bugs684121

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libotr (PTS)wheezy (security), wheezy3.2.1-1+deb7u2fixed
jessie (security), jessie4.1.0-2+deb8u1fixed
stretch, sid4.1.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libotrsource(unstable)3.2.1-1medium684121
libotrsourcesqueeze3.2.0-2+squeeze1mediumDSA-2526-1

Search for package or bug name: Reporting problems