Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.
References
Link | Resource |
---|---|
https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | Patch Vendor Advisory |
https://gitlab.matrix.org/matrix-org/olm/-/releases/3.2.3 | Release Notes Vendor Advisory |
https://matrix.org/blog/2021/06/14/adventures-in-fuzzing-libolm | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-16T17:11:53
Updated: 2021-06-16T17:11:53
Reserved: 2021-06-16T00:00:00
Link: CVE-2021-34813
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-16T18:15:09.730
Modified: 2021-06-23T14:29:37.357
Link: CVE-2021-34813
JSON object: View
Redhat Information
No data.
CWE