CVE-2016-2851

Published on: 04/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Libotr from Cypherpunks contain the following vulnerability:

Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.

  • CVE-2016-2851 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3512-1 libotr Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3512
USN-2926-1: OTR vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2926-1
[OTR-users] Security Advisory: upgrade to libotr 4.1.1 Exploit
lists.cypherpunks.ca
text/html
URL Logo MLIST [OTR-users] 20160309 Security Advisory: upgrade to libotr 4.1.1
[security-announce] openSUSE-SU-2016:0732-1: important: Security update Vendor Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0732
Libotr CVE-2016-2851 Integer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 84285
SecurityFocus Third Party Advisory
www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160309 Advisory X41-2016-001: Memory Corruption Vulnerability in "libotr"
libotr, Pidgin OTR: Remote execution of arbitrary code (GLSA 201701-10) — Gentoo security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-10
[security-announce] openSUSE-SU-2016:0708-1: important: Security update Mailing List
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0708
Full Disclosure: Advisory X41-2016-001: Memory Corruption Vulnerability in "libotr" Exploit
Mailing List
Third Party Advisory
seclists.org
text/html
URL Logo FULLDISC 20160309 Advisory X41-2016-001: Memory Corruption Vulnerability in "libotr"
Memory Corruption Vulnerability in "libotr" Exploit
www.x41-dsec.de
text/html
URL Logo MISC www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/
libotr 4.1.0 - Memory Corruption - Multiple dos Exploit Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39550

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCypherpunksLibotrAllAllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
  • cpe:2.3:a:cypherpunks:libotr:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*: