From owner-svn-ports-head@FreeBSD.ORG Thu Jul 11 20:35:20 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 7D3B2FD4; Thu, 11 Jul 2013 20:35:20 +0000 (UTC) (envelope-from cs@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 543FB1377; Thu, 11 Jul 2013 20:35:20 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6BKZKpY012256; Thu, 11 Jul 2013 20:35:20 GMT (envelope-from cs@svn.freebsd.org) Received: (from cs@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6BKZKY3012250; Thu, 11 Jul 2013 20:35:20 GMT (envelope-from cs@svn.freebsd.org) Message-Id: <201307112035.r6BKZKY3012250@svn.freebsd.org> From: Carlo Strub Date: Thu, 11 Jul 2013 20:35:20 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322797 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Jul 2013 20:35:20 -0000 Author: cs Date: Thu Jul 11 20:35:19 2013 New Revision: 322797 URL: http://svnweb.freebsd.org/changeset/ports/322797 Log: Security vulnerabilities in libzrtp Security: 04320e7d-ea66-11e2-a96e-60a44c524f57 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 11 20:24:30 2013 (r322796) +++ head/security/vuxml/vuln.xml Thu Jul 11 20:35:19 2013 (r322797) @@ -51,6 +51,35 @@ Note: Please add new entries to the beg --> + + libzrtpcpp -- multiple security vulnerabilities + + + libzrtpcpp + 2.3.4 + + + + +

Mark Dowd reports:

+
+

Vulnerability 1. Remote Heap Overflow: If an attacker sends a packet larger than 1024 bytes that gets stored temporarily (which occurs many times - such as when sending a ZRTP Hello packet), a heap overflow will occur, leading to potential arbitrary code execution on the vulnerable host.

+

Vulnerability 2. Multiple Stack Overflows: ZRTPCPP contains multiple stack overflows that arise when preparing a response to a client's ZRTP Hello packet.

+

Vulnerability 3. Information Leaking / Out of Bounds Reads: The ZRTPCPP library performs very little validation regarding the expected size of a packet versus the actual amount of data received. This can lead to both information leaking and out of bounds data reads (usually resulting in a crash). Information leaking can be performed for example by sending a malformed ZRTP Ping packet.

+
+ +
+ + CVE-2013-2221 + CVE-2013-2222 + CVE-2013-2223 + + + 2013-06-27 + 2013-07-11 + +
+ ruby -- Hostname check bypassing vulnerability in SSL client