A denial of service flaw was found in the way Ekiga, a Gnome based SIP/H323 teleconferencing application, processed information from certain OPAL connections (UTF-8 strings were not verified for validity prior showing them). A remote attacker (other party with a not UTF-8 valid name) could use this flaw to cause ekiga executable crash. Upstream bug report: [1] https://bugzilla.gnome.org/show_bug.cgi?id=653009 Relevant upstream patch: [2] http://git.gnome.org/browse/ekiga/commit/?id=7d09807257 References: [3] http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news
This issue did NOT affect the version of the ekiga package, as shipped with Red Hat Enterprise Linux 5. -- This issue affects the version of the ekiga package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the version of the ekiga package, as shipped with Fedora release of 16. Please schedule an update. -- This issue affects the version of the ekiga package, as shipped with Fedora release of 17 (current version in -stable repository). Version ekiga-4.0.0-1.fc17 already available from the -testing repository is not vulnerable to this issue.
Created ekiga tracking bugs for this issue Affects: fedora-16 [bug 883063]
CVE Request: http://www.openwall.com/lists/oss-security/2012/12/03/5
The CVE identifier of CVE-2012-5621 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2012/12/04/3
Are we sure that 4.0.0 isn't vulnerable? This is the fix in trunk: http://opalvoip.svn.sourceforge.net/viewvc/opalvoip?view=revision&revision=28824 And updated sample code: http://opalvoip.svn.sourceforge.net/viewvc/opalvoip/ptlib/trunk/samples/pxml/main.cxx?revision=28826&view=markup
ptlib-2.10.10-1.fc18, opal-3.10.10-1.fc18, ekiga-4.0.1-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
ptlib-2.10.10-1.fc17, opal-3.10.10-1.fc17, ekiga-4.0.1-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.