CVE-2013-2223
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
04/10/2013
Last modified:
11/04/2025
Description
GNU ZRTPCPP before 3.2.0 allows remote attackers to obtain sensitive information (uninitialized heap memory) or cause a denial of service (out-of-bounds read) via a crafted packet, as demonstrated by a truncated Ping packet that is not properly handled by the getEpHash function.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:wernerd:zrtpcpp:*:*:*:*:*:*:*:* | 3.2.1 (including) | |
| cpe:2.3:a:wernerd:zrtpcpp:2.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wernerd:zrtpcpp:2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wernerd:zrtpcpp:2.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wernerd:zrtpcpp:3.0.0:alpha:*:*:*:*:*:* | ||
| cpe:2.3:a:wernerd:zrtpcpp:3.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wernerd:zrtpcpp:3.2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html
- http://seclists.org/oss-sec/2013/q2/638
- http://secunia.com/advisories/53818
- http://secunia.com/advisories/54998
- http://security.gentoo.org/glsa/glsa-201309-13.xml
- https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637
- http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00052.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00053.html
- http://seclists.org/oss-sec/2013/q2/638
- http://secunia.com/advisories/53818
- http://secunia.com/advisories/54998
- http://security.gentoo.org/glsa/glsa-201309-13.xml
- https://github.com/wernerd/ZRTPCPP/commit/4654f330317c9948bb61d138eb24d49690ca4637



