CVE-2012-3461

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-3461
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2012-3461.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2012-3461
Published
2012-08-20T19:55:05Z
Modified
2025-04-11T00:51:21Z
Downstream
Summary
[none]
Details

The (1) otrlbase64otrdecode function in src/b64.c; (2) otrlprotodatareadflags and (3) otrlprotoacceptdata functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.

References

Affected packages

Debian:11 / libotr

Package

Name
libotr
Purl
pkg:deb/debian/libotr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.1-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / libotr

Package

Name
libotr
Purl
pkg:deb/debian/libotr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.1-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / libotr

Package

Name
libotr
Purl
pkg:deb/debian/libotr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.1-1

Ecosystem specific

{
    "urgency": "medium"
}