CVE-2013-2222

critical

Description

Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.

References

https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637

http://security.gentoo.org/glsa/glsa-201309-13.xml

http://secunia.com/advisories/54998

http://secunia.com/advisories/53818

http://seclists.org/oss-sec/2013/q2/638

http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html

http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html

Details

Source: Mitre, NVD

Published: 2013-10-04

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical