Vulnerability Name: | CVE-2018-4013 (CCN-151642) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-10-18 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-10-18 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-06-07 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-4013 Source: MLIST Type: Mailing List, Third Party Advisory [live-devel] 20181017 New LIVE555 version - fixes a potential vulnerability in the RTSP server implementation Source: CCN Type: Live Networks Web site LIVE555 Media Server Source: XF Type: UNKNOWN livenetworks-cve20184013-code-exec(151642) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20181120 [SECURITY] [DLA 1582-1] liblivemedia security update Source: GENTOO Type: Third Party Advisory GLSA-202005-06 Source: MISC Type: Exploit, Third Party Advisory https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684 Source: DEBIAN Type: Third Party Advisory DSA-4343 Source: CCN Type: Talos Vulnerability Report TALOS-2018-0684 Live Networks LIVE555 streaming media RTSPServer lookForHeader code execution vulnerability Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-4013 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |