Date: Thu, 11 Jul 2013 20:35:20 +0000 (UTC) From: Carlo Strub <cs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322797 - head/security/vuxml Message-ID: <201307112035.r6BKZKY3012250@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cs Date: Thu Jul 11 20:35:19 2013 New Revision: 322797 URL: http://svnweb.freebsd.org/changeset/ports/322797 Log: Security vulnerabilities in libzrtp Security: 04320e7d-ea66-11e2-a96e-60a44c524f57 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 11 20:24:30 2013 (r322796) +++ head/security/vuxml/vuln.xml Thu Jul 11 20:35:19 2013 (r322797) @@ -51,6 +51,35 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="04320e7d-ea66-11e2-a96e-60a44c524f57"> + <topic>libzrtpcpp -- multiple security vulnerabilities</topic> + <affects> + <package> + <name>libzrtpcpp</name> + <range><lt>2.3.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mark Dowd reports:</p> + <blockquote cite="http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html"> + <p>Vulnerability 1. Remote Heap Overflow: If an attacker sends a packet larger than 1024 bytes that gets stored temporarily (which occurs many times - such as when sending a ZRTP Hello packet), a heap overflow will occur, leading to potential arbitrary code execution on the vulnerable host.</p> + <p>Vulnerability 2. Multiple Stack Overflows: ZRTPCPP contains multiple stack overflows that arise when preparing a response to a client's ZRTP Hello packet.</p> + <p>Vulnerability 3. Information Leaking / Out of Bounds Reads: The ZRTPCPP library performs very little validation regarding the expected size of a packet versus the actual amount of data received. This can lead to both information leaking and out of bounds data reads (usually resulting in a crash). Information leaking can be performed for example by sending a malformed ZRTP Ping packet.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-2221</cvename> + <cvename>CVE-2013-2222</cvename> + <cvename>CVE-2013-2223</cvename> + </references> + <dates> + <discovery>2013-06-27</discovery> + <entry>2013-07-11</entry> + </dates> + </vuln> + <vuln vid="ebd877b9-7ef4-4375-b1fd-c67780581898"> <topic>ruby -- Hostname check bypassing vulnerability in SSL client</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307112035.r6BKZKY3012250>