Vulnerabilites related to live555 - liblivemedia
CVE-2020-24027 (GCVE-0-2020-24027)
Vulnerability from cvelistv5
Published
2021-01-11 19:41
Modified
2024-08-04 15:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP "PLAY" command, when the command specifies seeking by absolute time.
References
▼ | URL | Tags |
---|---|---|
http://www.live555.com/liveMedia/public/changelog.txt | x_refsource_MISC | |
http://lists.live555.com/pipermail/live-devel/2020-July/021662.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:05:11.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.live555.com/liveMedia/public/changelog.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP \"PLAY\" command, when the command specifies seeking by absolute time." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T19:41:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.live555.com/liveMedia/public/changelog.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP \"PLAY\" command, when the command specifies seeking by absolute time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.live555.com/liveMedia/public/changelog.txt", "refsource": "MISC", "url": "http://www.live555.com/liveMedia/public/changelog.txt" }, { "name": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html", "refsource": "MISC", "url": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24027", "datePublished": "2021-01-11T19:41:52", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-08-04T15:05:11.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-01-11 20:15
Modified
2024-11-21 05:14
Severity ?
Summary
In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP "PLAY" command, when the command specifies seeking by absolute time.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.live555.com/pipermail/live-devel/2020-July/021662.html | Exploit, Mailing List, Vendor Advisory | |
cve@mitre.org | http://www.live555.com/liveMedia/public/changelog.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.live555.com/pipermail/live-devel/2020-July/021662.html | Exploit, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.live555.com/liveMedia/public/changelog.txt | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
live555 | liblivemedia | 20200625 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:live555:liblivemedia:20200625:*:*:*:*:*:*:*", "matchCriteriaId": "AC6548BE-2FF3-4375-ABB6-F887420D2167", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP \"PLAY\" command, when the command specifies seeking by absolute time." }, { "lang": "es", "value": "En Live Networks, Inc., liblivemedia versi\u00f3n 20200625, presenta un error potencial de desbordamiento del b\u00fafer en el manejo del servidor de un comando RTSP \"PLAY\", cuando el comando especifica la b\u00fasqueda por tiempo absoluto" } ], "id": "CVE-2020-24027", "lastModified": "2024-11-21T05:14:19.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T20:15:16.427", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.live555.com/liveMedia/public/changelog.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "http://lists.live555.com/pipermail/live-devel/2020-July/021662.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.live555.com/liveMedia/public/changelog.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }