It was discovered that Ekiga had format string vulnerabilities beyond
those fixed in USN-426-1. If a user was running Ekiga and listening for
incoming calls, a remote attacker could send a crafted call request, and
execute arbitrary code with the user’s privileges.