First published: Fri Jan 04 2008(Updated: )
Multiple buffer overflows in the RTSP_valid_response_msg function in RTSP_state_machine.c in LScube Feng 0.1.15 and earlier allow remote attackers to execute arbitrary code via (1) a long first line of a response, as demonstrated by a long VER line; or (2) a long second line of a response, as demonstrated by a message that follows a RETURN line.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foreman | <=0.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6626 is classified as a high severity vulnerability due to the potential for remote code execution.
To remediate CVE-2007-6626, upgrade to a version of LScube Feng newer than 0.1.15.
CVE-2007-6626 affects LScube Feng version 0.1.15 and earlier.
CVE-2007-6626 is a buffer overflow vulnerability that allows remote code execution.
Yes, CVE-2007-6626 can be exploited remotely by sending specially crafted RTSP responses.