Search for packages
purl | pkg:deb/ubuntu/liblivemedia@2010.11.17-1 |
Next non-vulnerable version | 2018.11.26-1.1 |
Latest non-vulnerable version | 2018.11.26-1.1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-442h-secy-aaaf
Aliases: CVE-2013-6933 |
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. |
Affected by 4 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-5t39-b1n3-aaap
Aliases: CVE-2019-9215 |
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function. |
Affected by 0 other vulnerabilities. |
VCID-avxa-q6kw-aaad
Aliases: CVE-2019-7314 |
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact. |
Affected by 0 other vulnerabilities. |
VCID-uvzz-kxkn-aaag
Aliases: CVE-2018-4013 |
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. |
Affected by 3 other vulnerabilities. |
VCID-w1bw-vy7z-aaaa
Aliases: CVE-2019-6256 |
A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp. |
Affected by 2 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|