CVE-2013-2139
Published: 16 January 2014
Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
Priority
Status
Package | Release | Status |
---|---|---|
srtp Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [1.4.520130609dfsg-1])
|
|
upstream |
Needed
|
|
utopic |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
vivid |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
wily |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
xenial |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
yakkety |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
zesty |
Not vulnerable
(1.4.520130609dfsg-1)
|
|
Patches: other: https://github.com/cisco/libsrtp/pull/27 |