The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.
References
Link | Resource |
---|---|
https://gitlab.matrix.org/matrix-org/olm/-/tags | Product Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | Mailing List Third Party Advisory |
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk | Patch Vendor Advisory |
https://www.debian.org/security/2022/dsa-5034 | Third Party Advisory |
https://gitlab.matrix.org/matrix-org/olm/-/tags | Product Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | Mailing List Third Party Advisory |
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk | Patch Vendor Advisory |
https://www.debian.org/security/2022/dsa-5034 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.matrix.org/matrix-org/olm/-/tags - Product, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2022/dsa-5034 - Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 |
Information
Published : 2021-12-14 14:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44538
Mitre link : CVE-2021-44538
CVE.ORG link : CVE-2021-44538
JSON object : View
Products Affected
matrix
- element
- olm
- javascript_sdk
schildi
- schildichat
cinny_project
- cinny
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer