Upstream information

CVE-2013-2222 at MITRE

Description

Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 828028 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2013:1599-1 openSUSE-SU-2013:1600-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • libzrtpcpp-devel >= 4.6.4-1.1
  • libzrtpcpp4 >= 4.6.4-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10304


SUSE Timeline for this CVE

CVE page created: Wed Jul 3 20:16:54 2013
CVE page last modified: Sat Jun 15 21:52:40 2024