Vulnerability Details : CVE-2013-2221
Potential exploit
Heap-based buffer overflow in the ZRtp::storeMsgTemp function in GNU ZRTPCPP before 3.2.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large packet.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2013-2221
- cpe:2.3:a:wernerd:zrtpcpp:*:*:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:3.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wernerd:zrtpcpp:3.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2221
3.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-2221
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2221
-
http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html
Azimuth Security: Attacking Crypto Phones: Weaknesses in ZRTPCPPExploit
-
http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html
openSUSE-SU-2013:1600-1: moderate: update for zrtpcpp
-
http://security.gentoo.org/glsa/glsa-201309-13.xml
GNU ZRTP: Multiple vulnerabilities (GLSA 201309-13) — Gentoo security
-
http://secunia.com/advisories/53818
Sign inVendor Advisory
-
http://seclists.org/oss-sec/2013/q2/638
oss-sec: Re: CVE request: Multiple issues in GNU ZRTPCPP
-
http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html
openSUSE-SU-2013:1599-1: moderate: libzrtpcpp: fixed multiple security i
-
https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637
Change build files to generate version 3.2.0 · wernerd/ZRTPCPP@4654f33 · GitHubPatch
-
http://secunia.com/advisories/54998
Sign inVendor Advisory
Jump to