9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.8%
The olm_session_describe function in Matrix libolm before 3.2.7 is
vulnerable to a buffer overflow. The Olm session object represents a
cryptographic channel between two parties. Therefore, its state is
partially controllable by the remote party of the channel. Attackers can
construct a crafted sequence of messages to manipulate the state of the
receiver’s session in such a way that, for some buffer sizes, a buffer
overflow happens on a call to olm_session_describe. Furthermore, safe
buffer sizes were undocumented. The overflow content is partially
controllable by the attacker and limited to ASCII spaces and digits. The
known affected products are Element Web And SchildiChat Web.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | node-matrix-js-sdk | < any | UNKNOWN |
ubuntu | 22.04 | noarch | node-matrix-js-sdk | < any | UNKNOWN |
ubuntu | 23.10 | noarch | node-matrix-js-sdk | < any | UNKNOWN |
ubuntu | 18.04 | noarch | olm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | olm | < any | UNKNOWN |
ubuntu | 22.04 | noarch | olm | < any | UNKNOWN |
ubuntu | 23.10 | noarch | olm | < any | UNKNOWN |
ubuntu | 18.04 | noarch | thunderbird | < 1:91.5.0+build1-0ubuntu0.18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | thunderbird | < 1:91.5.0+build1-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu | 21.10 | noarch | thunderbird | < 1:91.5.0+build1-0ubuntu0.21.10.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-44538
matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk/
nvd.nist.gov/vuln/detail/CVE-2021-44538
security-tracker.debian.org/tracker/CVE-2021-44538
ubuntu.com/security/notices/USN-5246-1
ubuntu.com/security/notices/USN-5248-1
www.cve.org/CVERecord?id=CVE-2021-44538
www.mozilla.org/en-US/security/advisories/mfsa2021-55/#CVE-2021-44538
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.8%