ID CVE-2006-2022
Summary Buffer overflow in the parse_url function in the RTSP module (rtsp/parse_url.c) in Fenice 1.10 and earlier allows remote attackers to execute arbitrary code via a long URL.
References
Vulnerable Configurations
  • cpe:2.3:a:ls3:fenice:*:*:*:*:*:*:*:*
    cpe:2.3:a:ls3:fenice:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:37)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17678
bugtraq
  • 20060423 Buffer-overflow and crash in Fenice OMS 1.10
  • 20060425 Fenice - Open Media Streaming Server remote BOF exploit
  • 20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10
misc http://aluigi.altervista.org/adv/fenicex-adv.txt
secunia 19770
sreason 794
vupen ADV-2006-1491
xf fenice-parseurl-bo(26078)
Last major update 18-10-2018 - 16:37
Published 25-04-2006 - 20:06
Last modified 18-10-2018 - 16:37
Back to Top