Buffer overflow in srtp.sourceforge.net products - CVE-2013-2139
Published: January 16, 2014 / Updated: August 10, 2020
SUSE
srtp.sourceforge.net
Fedora
Opensuse
libsrtp
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
How to mitigate CVE-2013-2139
Sources
- http://advisories.mageia.org/MGASA-2014-0465.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00083.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00059.html
- http://lwn.net/Articles/579633/
- http://seclists.org/fulldisclosure/2013/Jun/10
- http://www.debian.org/security/2014/dsa-2840
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:219
- http://www.osvdb.org/93852
- https://bugzilla.redhat.com/show_bug.cgi?id=970697
- https://github.com/cisco/libsrtp/pull/27