CVE-2013-2222

Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wernerd:zrtpcpp:*:*:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:3.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:wernerd:zrtpcpp:3.2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-10-04 17:55

Updated : 2024-02-28 12:00


NVD link : CVE-2013-2222

Mitre link : CVE-2013-2222

CVE.ORG link : CVE-2013-2222


JSON object : View

Products Affected

wernerd

  • zrtpcpp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer