Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14114

Опубликовано: 02 сент. 2017
Источник: debian
EPSS Низкий

Описание

RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers to obtain sensitive information or cause a denial of service (communication outage) via crafted RTP packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rtpproxyremovedpackage

Примечания

  • https://rtpbleed.com/

  • https://github.com/sippy/rtpproxy/issues/70

  • Design limitation in RTP protocol

EPSS

Процентиль: 49%
0.00261
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers to obtain sensitive information or cause a denial of service (communication outage) via crafted RTP packets.

CVSS3: 6.5
nvd
больше 8 лет назад

RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers to obtain sensitive information or cause a denial of service (communication outage) via crafted RTP packets.

CVSS3: 6.5
github
больше 3 лет назад

RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers to obtain sensitive information or cause a denial of service (communication outage) via crafted RTP packets.

EPSS

Процентиль: 49%
0.00261
Низкий