First published: Fri Jan 04 2008(Updated: )
LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via (1) a malformed Transport header, which triggers misparsing in parse_transport_header in RTSP_setup.c, as demonstrated by a Transport header that contains only a "RTP/AVP;unicast;client_port" sequence; or (2) a malformed Range header, which triggers misparsing in parse_play_time_range in RTSP_Play, as demonstrated by an empty Range header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foreman | <=0.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6628 has a severity rating that indicates it can lead to a denial of service through daemon crash.
To fix CVE-2007-6628, it is recommended to upgrade to LScube Feng version 0.1.16 or later.
The impact of CVE-2007-6628 on LScube Feng is that it allows remote attackers to crash the service through malformed Transport headers.
CVE-2007-6628 affects LScube Feng versions up to and including 0.1.15.
Yes, CVE-2007-6628 can be exploited remotely by sending crafted Transport headers.