Search for packages
purl | pkg:deb/debian/liblivemedia@2006.03.17-2 |
Next non-vulnerable version | 2018.11.26-1.1 |
Latest non-vulnerable version | 2018.11.26-1.1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-442h-secy-aaaf
Aliases: CVE-2013-6933 |
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. |
Affected by 5 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-5t39-b1n3-aaap
Aliases: CVE-2019-9215 |
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function. |
Affected by 4 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-avxa-q6kw-aaad
Aliases: CVE-2019-7314 |
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact. |
Affected by 4 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-uvzz-kxkn-aaag
Aliases: CVE-2018-4013 |
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. |
Affected by 4 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-w1bw-vy7z-aaaa
Aliases: CVE-2019-6256 |
A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp. |
Affected by 4 other vulnerabilities. Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T16:13:26.869827+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T15:10:21.847320+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T14:35:08.471147+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T13:41:13.250946+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T13:41:01.961618+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T10:58:19.498470+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:53:31.083923+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:50:18.541516+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-21T10:42:40.565063+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.3 |
2025-06-20T22:11:45.494123+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.1.3 |
2025-06-20T21:35:31.572658+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.1.3 |
2025-06-20T20:03:49.373530+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.1.3 |
2025-06-20T19:56:12.051887+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.1.3 |
2025-06-20T19:28:17.353032+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | None | 36.1.3 |
2025-06-08T09:01:10.135612+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T08:04:00.429361+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T07:28:13.946528+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T06:35:27.728673+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T06:35:16.344723+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T04:31:10.439646+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:28:14.966140+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:26:03.297768+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-08T04:21:45.823952+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.1.0 |
2025-06-07T15:35:47.495609+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.1.0 |
2025-06-07T14:58:07.126635+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.1.0 |
2025-06-07T13:51:23.148788+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.1.0 |
2025-06-07T13:46:28.602806+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.1.0 |
2025-06-07T13:25:44.911080+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | None | 36.1.0 |
2025-06-03T13:25:02.976180+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | None | 36.1.2 |
2025-04-08T07:32:51.540805+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T06:36:09.977581+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T06:01:03.277995+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T05:07:46.588981+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T05:07:35.032876+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T03:01:31.928896+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:58:25.061764+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:56:03.203988+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-08T02:51:22.965491+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 | 36.0.0 |
2025-04-07T14:06:47.301707+00:00 | Debian Oval Importer | Affected by | VCID-avxa-q6kw-aaad | None | 36.0.0 |
2025-04-07T13:30:01.676008+00:00 | Debian Oval Importer | Affected by | VCID-5t39-b1n3-aaap | None | 36.0.0 |
2025-04-07T12:26:17.963408+00:00 | Debian Oval Importer | Affected by | VCID-uvzz-kxkn-aaag | None | 36.0.0 |
2025-04-07T12:21:37.981769+00:00 | Debian Oval Importer | Affected by | VCID-w1bw-vy7z-aaaa | None | 36.0.0 |
2025-04-07T12:01:15.924495+00:00 | Debian Oval Importer | Affected by | VCID-442h-secy-aaaf | None | 36.0.0 |