Lucene search

K
cveRedhatCVE-2013-2222
HistoryOct 04, 2013 - 5:55 p.m.

CVE-2013-2222

2013-10-0417:55:09
CWE-119
redhat
web.nvd.nist.gov
29
cve-2013-2222
information security
buffer overflow
gnu zrtpcpp
remote attack

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.025

Percentile

90.2%

Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.

Affected configurations

Nvd
Node
wernerdzrtpcppRange3.2.1
OR
wernerdzrtpcppMatch2.1.2
OR
wernerdzrtpcppMatch2.2.0
OR
wernerdzrtpcppMatch2.3.0
OR
wernerdzrtpcppMatch3.0.0alpha
OR
wernerdzrtpcppMatch3.1.0
OR
wernerdzrtpcppMatch3.2.0
VendorProductVersionCPE
wernerdzrtpcpp2.1.2cpe:/a:wernerd:zrtpcpp:2.1.2:::
wernerdzrtpcpp3.2.0cpe:/a:wernerd:zrtpcpp:3.2.0:::
wernerdzrtpcpp3.1.0cpe:/a:wernerd:zrtpcpp:3.1.0:::
wernerdzrtpcppcpe:/a:wernerd:zrtpcpp::::
wernerdzrtpcpp3.0.0cpe:/a:wernerd:zrtpcpp:3.0.0:alpha::
wernerdzrtpcpp2.3.0cpe:/a:wernerd:zrtpcpp:2.3.0:::
wernerdzrtpcpp2.2.0cpe:/a:wernerd:zrtpcpp:2.2.0:::

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.025

Percentile

90.2%