Debian: 2840-1: srtp: buffer overflow
Posted by Benjamin D. Thomas   
Debian Fernando Russ from Groundworks Technologies reported a buffer overflow flaw in srtp, Cisco's reference implementation of the Secure Real-time Transport Protocol (SRTP), in how the crypto_policy_set_from_profile_for_rtp() function applies [More...]
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2840-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
January 10, 2014                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : srtp
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-2139
Debian Bug     : 711163

  Fernando Russ from Groundworks Technologies reported a buffer overflow
  flaw in srtp, Cisco's reference implementation of the Secure Real-time
  Transport Protocol (SRTP), in how the
  crypto_policy_set_from_profile_for_rtp() function applies
  cryptographic profiles to an srtp_policy. A remote attacker could
  exploit this vulnerability to crash an application linked against
  libsrtp, resulting in a denial of service.

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.4.4~dfsg-6+deb6u1.

For the stable distribution (wheezy), this problem has been fixed in
version 1.4.4+20100615~dfsg-2+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1.4.5~20130609~dfsg-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.5~20130609~dfsg-1.

We recommend that you upgrade your srtp packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----