Unrated severityNVD Advisory· Published Oct 19, 2018· Updated Sep 16, 2024
CVE-2018-4013
CVE-2018-4013
Description
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
Affected products
1- Range: Version 0.92
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- security.gentoo.org/glsa/202005-06mitrevendor-advisoryx_refsource_GENTOO
- www.debian.org/security/2018/dsa-4343mitrevendor-advisoryx_refsource_DEBIAN
- lists.live555.com/pipermail/live-devel/2018-October/021071.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2018/11/msg00020.htmlmitremailing-listx_refsource_MLIST
- talosintelligence.com/vulnerability_reports/TALOS-2018-0684mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.