First published: Mon Dec 03 2012(Updated: )
A denial of service flaw was found in the way Ekiga, a Gnome based SIP/H323 teleconferencing application, processed information from certain OPAL connections (UTF-8 strings were not verified for validity prior showing them). A remote attacker (other party with a not UTF-8 valid name) could use this flaw to cause ekiga executable crash. Upstream bug report: [1] <a href="https://bugzilla.gnome.org/show_bug.cgi?id=653009">https://bugzilla.gnome.org/show_bug.cgi?id=653009</a> Relevant upstream patch: [2] <a href="http://git.gnome.org/browse/ekiga/commit/?id=7d09807257">http://git.gnome.org/browse/ekiga/commit/?id=7d09807257</a> References: [3] <a href="http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news">http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Ekiga | <4.0.0 | 4.0.0 |
Ekiga | <=3.9.90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5621 has a severity rating indicating a denial of service vulnerability that could disrupt service for Ekiga users.
CVE-2012-5621 affects Ekiga by allowing a remote attacker to cause a denial of service through invalid UTF-8 strings.
To fix CVE-2012-5621, upgrade to a version of Ekiga that is above 3.9.90, as later versions have addressed this vulnerability.
Users of Ekiga versions 3.9.90 and below are impacted by CVE-2012-5621 and should take action to mitigate the risk.
Yes, CVE-2012-5621 can be exploited remotely by any party sending invalid UTF-8 data to Ekiga.