CVE-2021-44538
Description
The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 90 Days)
Improper Restriction of Operations within the Bounds of a Memory Buffer
StableCommon Consequences
Applicable Platforms
Debian Linux by Debian
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Element by Matrix
cpe:2.3:a:matrix:element:*:*:*:*:desktop:*:*:*
Olm by Matrix
cpe:2.3:a:matrix:olm:*:*:*:*:*:*:*:*
Cinny by Cinny Project
cpe:2.3:a:cinny_project:cinny:*:*:*:*:*:*:*:*
Element by Matrix
cpe:2.3:a:matrix:element:*:*:*:*:web:*:*:*
Schildichat by Schildi
cpe:2.3:a:schildi:schildichat:*:*:*:*:desktop:*:*:*
Schildichat by Schildi
cpe:2.3:a:schildi:schildichat:*:*:*:*:web:*:*:*
Debian Linux by Debian
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Javascript Sdk by Matrix
cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:*:*:*
Debian Linux by Debian
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*