Buffer overflow in srtp.sourceforge.net products - CVE-2013-2139

 

Buffer overflow in srtp.sourceforge.net products - CVE-2013-2139

Published: January 16, 2014 / Updated: August 10, 2020


Vulnerability identifier: #VU42150
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2013-2139
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Fedoraproject
SUSE
srtp.sourceforge.net
Affected software:
Fedora
Opensuse
libsrtp

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.


How to mitigate CVE-2013-2139

Install update from vendor's website.

Sources