Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0571
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0571)
Resumen:The remote host is missing an update for the 'olm' package(s) announced via the MGASA-2021-0571 advisory.
Descripción:Summary:
The remote host is missing an update for the 'olm' package(s) announced via the MGASA-2021-0571 advisory.

Vulnerability Insight:
Updated olm packages fix security vulnerability:

The olm_session_describe function in Matrix libolm before 3.2.7 is
vulnerable to a buffer overflow. The Olm session object represents a
cryptographic channel between two parties. Therefore, its state is
partially controllable by the remote party of the channel. Attackers
can construct a crafted sequence of messages to manipulate the state
of the receiver's session in such a way that, for some buffer sizes,
a buffer overflow happens on a call to olm_session_describe.
Furthermore, safe buffer sizes were undocumented. The overflow content
is partially controllable by the attacker and limited to ASCII spaces
and digits (CVE-2021-44538).

Affected Software/OS:
'olm' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-44538
Debian Security Information: DSA-5034 (Google Search)
https://www.debian.org/security/2022/dsa-5034
https://gitlab.matrix.org/matrix-org/olm/-/tags
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.