CVE-2012-3461

Source
https://cve.org/CVERecord?id=CVE-2012-3461
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-3461.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-3461
Downstream
Published
2012-08-20T19:55:05Z
Modified
2026-04-10T03:43:12.409534Z
Summary
[none]
Details

The (1) otrlbase64otrdecode function in src/b64.c; (2) otrlprotodatareadflags and (3) otrlprotoacceptdata functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.

References

Affected packages