A heap-based buffer overflow flaw was found in the way libzrtpcpp, a ZRTP support library for the GNU ccRTP stack, processed certain ZRTP packets (overly-large ZRTP packets of several types). A remote attacker could provide a specially-crafted ZRTP packet that, when processed in an application linked against libzrtpcpp would lead to that application crash or, potentially, arbitrary code execution with the privileges of the user running that application. References: [1] http://www.openwall.com/lists/oss-security/2013/06/29/1 [2] http://www.openwall.com/lists/oss-security/2013/06/30/2 [3] http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html Relevant upstream patch: [4] https://github.com/wernerd/ZRTPCPP/commit/c8617100f359b217a974938c5539a1dd8a120b0e
This issue affects the versions of the libzrtpcpp package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue affects the versions of the libzrtpcpp package, as shipped with Fedora EPEL-5 and Fedora EPEL-6. Please schedule an update.
Created libzrtpcpp tracking bugs for this issue: Affects: fedora-all [bug 980904]
Created libzrtpcpp tracking bugs for this issue: Affects: epel-all [bug 980905]
libzrtpcpp-2.3.4-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.