Vulnerability Name: | CVE-2021-44538 (CCN-215216) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-12-13 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-12-13 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-04-12 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-44538 Source: XF Type: UNKNOWN matrix-cve202144538-bo(215216) Source: MISC Type: Product, Third Party Advisory https://gitlab.matrix.org/matrix-org/olm/-/tags Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update Source: CCN Type: Matrix Web site libolm and matrix-js-sdk Source: CCN Type: Matrix Blog, 2021-12-13 Disclosure: buffer overflow in libolm and matrix-js-sdk Source: MISC Type: Patch, Vendor Advisory https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk Source: DEBIAN Type: Third Party Advisory DSA-5034 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |