Search for packages
purl | pkg:deb/debian/liblivemedia@2016.11.28-1%2Bdeb9u2 |
Next non-vulnerable version | 2018.11.26-1.1 |
Latest non-vulnerable version | 2018.11.26-1.1 |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-5t39-b1n3-aaap
Aliases: CVE-2019-9215 |
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function. |
Affected by 0 other vulnerabilities. |
VCID-avxa-q6kw-aaad
Aliases: CVE-2019-7314 |
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact. |
Affected by 0 other vulnerabilities. |
VCID-uvzz-kxkn-aaag
Aliases: CVE-2018-4013 |
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. |
Affected by 0 other vulnerabilities. |
VCID-w1bw-vy7z-aaaa
Aliases: CVE-2019-6256 |
A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-5t39-b1n3-aaap | In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function. |
CVE-2019-9215
|
VCID-avxa-q6kw-aaad | liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact. |
CVE-2019-7314
|
VCID-uvzz-kxkn-aaag | An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. |
CVE-2018-4013
|
VCID-w1bw-vy7z-aaaa | A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp. |
CVE-2019-6256
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T15:10:21.856411+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T14:35:08.479743+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T13:41:13.261556+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T13:41:01.973980+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T10:58:19.509231+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:53:31.093961+00:00 | Debian Oval Importer | Fixing | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:50:18.551518+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:42:40.577466+00:00 | Debian Oval Importer | Fixing | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T00:22:29.011167+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.1.3 |
2025-06-20T23:47:06.069070+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.1.3 |
2025-06-20T22:11:45.505011+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.1.3 |
2025-06-20T21:35:31.581151+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.1.3 |
2025-06-20T20:03:49.383748+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | None | 36.1.3 |
2025-06-20T19:56:12.059554+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | None | 36.1.3 |
2025-06-08T08:04:00.438438+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T07:28:13.955782+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T06:35:27.736391+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T06:35:16.352648+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T04:31:10.447382+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:28:14.973662+00:00 | Debian Oval Importer | Fixing | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:26:03.306862+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:21:45.831675+00:00 | Debian Oval Importer | Fixing | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-07T17:45:18.474879+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.1.0 |
2025-06-07T17:09:58.444807+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.1.0 |
2025-06-07T15:35:47.504054+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.1.0 |
2025-06-07T14:58:07.135840+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.1.0 |
2025-06-07T13:51:23.156802+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | None | 36.1.0 |
2025-06-07T13:46:28.611739+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | None | 36.1.0 |
2025-04-08T06:36:10.002161+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T06:01:03.301942+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T05:07:46.613925+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T05:07:35.057836+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T03:01:31.953784+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:58:25.087498+00:00 | Debian Oval Importer | Fixing | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:56:03.228899+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:51:22.990754+00:00 | Debian Oval Importer | Fixing | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-07T16:21:31.386095+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.0.0 |
2025-04-07T15:43:36.287016+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.0.0 |
2025-04-07T14:06:47.329119+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.0.0 |
2025-04-07T13:30:01.703483+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.0.0 |
2025-04-07T12:26:17.990044+00:00 | Debian Oval Importer | Fixing | VCID-uvzz-kxkn-aaag | None | 36.0.0 |
2025-04-07T12:21:38.011536+00:00 | Debian Oval Importer | Fixing | VCID-w1bw-vy7z-aaaa | None | 36.0.0 |