First published: Mon Jul 11 2022(Updated: )
Live555 through 1.08 does not handle socket connections properly. A huge number of incoming socket connections in a short time invokes the error-handling module, in which a heap-based buffer overflow happens. An attacker can leverage this to launch a DoS attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Live555 Live555 | <=1.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41396 is a vulnerability in Live555 version 1.08 and earlier, which could allow an attacker to launch a DoS (Denial-of-Service) attack by exploiting a heap-based buffer overflow that occurs when handling a large number of incoming socket connections in a short time.
CVE-2021-41396 has a severity score of 7.5 (high) according to CVSS (Common Vulnerability Scoring System).
CVE-2021-41396 affects Live555 version 1.08 and earlier, causing improper handling of socket connections, leading to a heap-based buffer overflow vulnerability.
The impact of CVE-2021-41396 is that an attacker can exploit the vulnerability to launch a DoS attack, potentially disrupting the functionality of the affected Live555 server.
To mitigate CVE-2021-41396, it is recommended to update Live555 to a version that has addressed the vulnerability, such as version 1.09 or later.