Описание
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| liblivemedia | fixed | 2018.10.17-1 | package |
Примечания
http://lists.live555.com/pipermail/live-devel/2018-October/021071.html
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684
EPSS
Связанные уязвимости
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
Уязвимость реализации синтаксического анализатора («парсера») HTTP-пакетов библиотеки LIVE555 RTSP сервера, связанная с переполнением буфера стека, позволяющая нарушителю выполнить произвольный код
EPSS