Описание
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | DNE | |
| disco | not-affected | 2018.10.17-1 |
| eoan | not-affected | 2018.10.17-1 |
| esm-apps/bionic | released | 2018.02.18-1ubuntu0.1~esm1 |
| esm-apps/focal | not-affected | 2018.10.17-1 |
| esm-apps/xenial | released | 2016.02.09-1ubuntu0.1~esm1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [2014.01.13-1+deb8u1build0.14.04.1]] |
| focal | not-affected | 2018.10.17-1 |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
An exploitable code execution vulnerability exists in the HTTP packet- ...
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
Уязвимость реализации синтаксического анализатора («парсера») HTTP-пакетов библиотеки LIVE555 RTSP сервера, связанная с переполнением буфера стека, позволяющая нарушителю выполнить произвольный код
7.5 High
CVSS2
9.8 Critical
CVSS3