Upstream information

CVE-2013-2223 at MITRE

Description

GNU ZRTPCPP before 3.2.0 allows remote attackers to obtain sensitive information (uninitialized heap memory) or cause a denial of service (out-of-bounds read) via a crafted packet, as demonstrated by a truncated Ping packet that is not properly handled by the getEpHash function.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 828028 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2013:1599-1 openSUSE-SU-2013:1600-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • libzrtpcpp-devel >= 4.6.4-1.1
  • libzrtpcpp4 >= 4.6.4-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10304


SUSE Timeline for this CVE

CVE page created: Wed Jul 3 20:16:54 2013
CVE page last modified: Sat Jun 15 21:52:41 2024