First published: Fri Oct 19 2018(Updated: )
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/liblivemedia | 2018.11.26-1.1 | |
Live555 Live555 Media Server | =0.92 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4013 is an exploitable code execution vulnerability in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92.
CVE-2018-4013 has a severity rating of 9.8 (Critical).
CVE-2018-4013 can be triggered by sending a specially crafted packet to the vulnerable server, causing a stack-based buffer overflow and resulting in code execution.
The affected versions include LIVE555 RTSP server library version 0.92, liblivemedia package version 2018.11.26-1.1 on Debian, and Live555 Media Server version 0.92.
To fix CVE-2018-4013, users should update their software to the patched versions, such as liblivemedia package version 2018.11.26-1.1 on Debian, which contains the necessary remedy.