The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2012-08-20T19:00:00
Updated: 2024-08-06T20:05:12.525Z
Reserved: 2012-06-14T00:00:00
Link: CVE-2012-3461
Vulnrichment
No data.
NVD
Status : Modified
Published: 2012-08-20T19:55:05.527
Modified: 2024-11-21T01:40:55.463
Link: CVE-2012-3461
Redhat
No data.