All the vulnerabilites related to live555 - streaming_media
cve-2019-9215
Vulnerability from cvelistv5
Published
2019-02-28 04:00
Modified
2024-08-04 21:38
Severity ?
Summary
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:38:46.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.live555.com/liveMedia/public/changelog.txt"
          },
          {
            "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2019/Mar/22"
          },
          {
            "name": "DSA-4408",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2019/dsa-4408"
          },
          {
            "name": "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html"
          },
          {
            "name": "openSUSE-SU-2019:1797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
          },
          {
            "name": "openSUSE-SU-2019:1880",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
          },
          {
            "name": "GLSA-202005-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202005-06"
          },
          {
            "name": "openSUSE-SU-2020:0944",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-07T05:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.live555.com/liveMedia/public/changelog.txt"
        },
        {
          "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2019/Mar/22"
        },
        {
          "name": "DSA-4408",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2019/dsa-4408"
        },
        {
          "name": "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html"
        },
        {
          "name": "openSUSE-SU-2019:1797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
        },
        {
          "name": "openSUSE-SU-2019:1880",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
        },
        {
          "name": "GLSA-202005-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202005-06"
        },
        {
          "name": "openSUSE-SU-2020:0944",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-9215",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.live555.com/liveMedia/public/changelog.txt",
              "refsource": "MISC",
              "url": "http://www.live555.com/liveMedia/public/changelog.txt"
            },
            {
              "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2019/Mar/22"
            },
            {
              "name": "DSA-4408",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2019/dsa-4408"
            },
            {
              "name": "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html"
            },
            {
              "name": "openSUSE-SU-2019:1797",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
            },
            {
              "name": "openSUSE-SU-2019:1880",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
            },
            {
              "name": "GLSA-202005-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202005-06"
            },
            {
              "name": "openSUSE-SU-2020:0944",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-9215",
    "datePublished": "2019-02-28T04:00:00",
    "dateReserved": "2019-02-27T00:00:00",
    "dateUpdated": "2024-08-04T21:38:46.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-15232
Vulnerability from cvelistv5
Published
2019-08-19 23:57
Modified
2024-08-05 00:42
Severity ?
Summary
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.
References
http://www.live555.com/liveMedia/public/changelog.txtx_refsource_MISC
https://security.gentoo.org/glsa/202005-06vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:42:04.063Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.live555.com/liveMedia/public/changelog.txt"
          },
          {
            "name": "GLSA-202005-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202005-06"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-14T23:06:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.live555.com/liveMedia/public/changelog.txt"
        },
        {
          "name": "GLSA-202005-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202005-06"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-15232",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.live555.com/liveMedia/public/changelog.txt",
              "refsource": "MISC",
              "url": "http://www.live555.com/liveMedia/public/changelog.txt"
            },
            {
              "name": "GLSA-202005-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202005-06"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-15232",
    "datePublished": "2019-08-19T23:57:37",
    "dateReserved": "2019-08-19T00:00:00",
    "dateUpdated": "2024-08-05T00:42:04.063Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6934
Vulnerability from cvelistv5
Published
2014-01-23 21:00
Modified
2024-08-06 17:53
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:53:45.351Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "65139",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65139"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.live555.com/liveMedia/public/changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "65139",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65139"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.live555.com/liveMedia/public/changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6934",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "65139",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65139"
            },
            {
              "name": "http://www.live555.com/liveMedia/public/changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://www.live555.com/liveMedia/public/changelog.txt"
            },
            {
              "name": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
              "refsource": "MISC",
              "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6934",
    "datePublished": "2014-01-23T21:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T17:53:45.351Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-7732
Vulnerability from cvelistv5
Published
2019-02-11 17:00
Modified
2024-08-04 20:54
Severity ?
Summary
In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:54:28.417Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rgaufman/live555/issues/20"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-11T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rgaufman/live555/issues/20"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-7732",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/rgaufman/live555/issues/20",
              "refsource": "MISC",
              "url": "https://github.com/rgaufman/live555/issues/20"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-7732",
    "datePublished": "2019-02-11T17:00:00",
    "dateReserved": "2019-02-11T00:00:00",
    "dateUpdated": "2024-08-04T20:54:28.417Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-28899
Vulnerability from cvelistv5
Published
2021-04-29 14:08
Modified
2024-08-03 21:55
Severity ?
Summary
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T21:55:11.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-29T14:08:31",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-28899",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
              "refsource": "MISC",
              "url": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-28899",
    "datePublished": "2021-04-29T14:08:31",
    "dateReserved": "2021-03-19T00:00:00",
    "dateUpdated": "2024-08-03T21:55:11.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-7314
Vulnerability from cvelistv5
Published
2019-02-04 02:00
Modified
2024-08-04 20:46
Severity ?
Summary
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:46:46.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.live555.com/liveMedia/public/changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html"
          },
          {
            "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2019/Mar/22"
          },
          {
            "name": "DSA-4408",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2019/dsa-4408"
          },
          {
            "name": "openSUSE-SU-2019:1797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
          },
          {
            "name": "openSUSE-SU-2019:1880",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
          },
          {
            "name": "GLSA-202005-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202005-06"
          },
          {
            "name": "openSUSE-SU-2020:0944",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-07T05:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.live555.com/liveMedia/public/changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html"
        },
        {
          "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2019/Mar/22"
        },
        {
          "name": "DSA-4408",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2019/dsa-4408"
        },
        {
          "name": "openSUSE-SU-2019:1797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
        },
        {
          "name": "openSUSE-SU-2019:1880",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
        },
        {
          "name": "GLSA-202005-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202005-06"
        },
        {
          "name": "openSUSE-SU-2020:0944",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-7314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html"
            },
            {
              "name": "http://www.live555.com/liveMedia/public/changelog.txt",
              "refsource": "MISC",
              "url": "http://www.live555.com/liveMedia/public/changelog.txt"
            },
            {
              "name": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
              "refsource": "MISC",
              "url": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html"
            },
            {
              "name": "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2019/Mar/22"
            },
            {
              "name": "DSA-4408",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2019/dsa-4408"
            },
            {
              "name": "openSUSE-SU-2019:1797",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
            },
            {
              "name": "openSUSE-SU-2019:1880",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
            },
            {
              "name": "GLSA-202005-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202005-06"
            },
            {
              "name": "openSUSE-SU-2020:0944",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-7314",
    "datePublished": "2019-02-04T02:00:00",
    "dateReserved": "2019-02-03T00:00:00",
    "dateUpdated": "2024-08-04T20:46:46.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-7733
Vulnerability from cvelistv5
Published
2019-02-11 17:00
Modified
2024-08-04 20:54
Severity ?
Summary
In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.
References
https://github.com/rgaufman/live555/issues/21x_refsource_MISC
https://security.gentoo.org/glsa/202005-06vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:54:28.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rgaufman/live555/issues/21"
          },
          {
            "name": "GLSA-202005-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202005-06"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-14T23:06:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rgaufman/live555/issues/21"
        },
        {
          "name": "GLSA-202005-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202005-06"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-7733",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/rgaufman/live555/issues/21",
              "refsource": "MISC",
              "url": "https://github.com/rgaufman/live555/issues/21"
            },
            {
              "name": "GLSA-202005-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202005-06"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-7733",
    "datePublished": "2019-02-11T17:00:00",
    "dateReserved": "2019-02-11T00:00:00",
    "dateUpdated": "2024-08-04T20:54:28.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6933
Vulnerability from cvelistv5
Published
2014-01-23 21:00
Modified
2024-08-06 17:53
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:53:45.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.live555.com/liveMedia/public/changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-01-23T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.live555.com/liveMedia/public/changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6933",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.live555.com/liveMedia/public/changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://www.live555.com/liveMedia/public/changelog.txt"
            },
            {
              "name": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
              "refsource": "MISC",
              "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6933",
    "datePublished": "2014-01-23T21:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T17:53:45.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-08-20 00:15
Modified
2024-11-21 04:28
Severity ?
Summary
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.
Impacted products
Vendor Product Version
live555 streaming_media *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "485C442E-F46F-4515-A1A2-3044CFEAF01D",
              "versionEndExcluding": "2019-08-16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors."
    },
    {
      "lang": "es",
      "value": "Live555 versiones anteriores a 2019.08.16, presenta un uso de la memoria previamente liberada porque la funci\u00f3n GenericMediaServer::createNewClientSessionWithId puede generar el mismo ID de sesi\u00f3n de cliente en sucesi\u00f3n, el cual es manejado inapropiadamente por los demultiplexores de archivos MPEG1or2 y Matroska."
    }
  ],
  "id": "CVE-2019-15232",
  "lastModified": "2024-11-21T04:28:15.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-20T00:15:10.237",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202005-06"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-04-29 15:15
Modified
2024-11-21 06:00
Summary
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
Impacted products
Vendor Product Version
live555 streaming_media *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3FA48C-510C-481C-8091-C3FF9412F577",
              "versionEndExcluding": "2021.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en las subclases AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession y AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession en redes LIVE555 Streaming Media versiones anteriores a 2021.3.16"
    }
  ],
  "id": "CVE-2021-28899",
  "lastModified": "2024-11-21T06:00:21.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-29T15:15:10.987",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-11 17:29
Modified
2024-11-21 04:48
Summary
In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.
Impacted products
Vendor Product Version
live555 streaming_media 0.95



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EFF72B-05B5-48D0-B5AA-C8BFD85F2CBE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove."
    },
    {
      "lang": "es",
      "value": "En Live555 0.95, hay un desbordamiento de b\u00fafer mediante un entero largo en una cabecera HTTP Content-Length debido a que handleRequestBytes tiene un memmove no restringido."
    }
  ],
  "id": "CVE-2019-7733",
  "lastModified": "2024-11-21T04:48:36.547",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-11T17:29:00.490",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/rgaufman/live555/issues/21"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/rgaufman/live555/issues/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202005-06"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-11 17:29
Modified
2024-11-21 04:48
Summary
In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.
Impacted products
Vendor Product Version
live555 streaming_media 0.95



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EFF72B-05B5-48D0-B5AA-C8BFD85F2CBE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed."
    },
    {
      "lang": "es",
      "value": "En Live555 0.95, un paquete de instalaci\u00f3n puede provocar una fuga de memoria y una denegaci\u00f3n de servicio (DoS). Esto se debe a que, cuando hay m\u00faltiples instancias de un \u00fanico campo (username, realm, nonce, uri o response), solo se puede liberar la \u00faltima instancia."
    }
  ],
  "id": "CVE-2019-7732",
  "lastModified": "2024-11-21T04:48:36.400",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-11T17:29:00.443",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/rgaufman/live555/issues/20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/rgaufman/live555/issues/20"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-401"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-23 21:55
Modified
2024-11-21 01:59
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.
Impacted products
Vendor Product Version
live555 streaming_media 2013-11-26
videolan vlc_media_player *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB033D9-C10C-428C-A7EF-DCF113967A19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC766DE-C9B4-4067-B90F-37DBB63EEFE0",
              "versionEndExcluding": "2.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n parseRTSPRequestString en Live Networks Live555 Streaming Media 2013.11.26, tal como se usa en VideoLAN VLC Media Player, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un car\u00e1cter en blanco en el comienzo de un mensaje RTSP, lo que desencadena en un underflow de enteros, bucle infinito, y desbordamiento de b\u00fafer. NOTA: esta vulnerabilidad existe por una soluci\u00f3n incompleta en CVE-2013-6933."
    }
  ],
  "id": "CVE-2013-6934",
  "lastModified": "2024-11-21T01:59:59.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-23T21:55:04.947",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65139"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-28 04:29
Modified
2024-11-21 04:51
Severity ?
Summary
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/03/msg00022.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://seclists.org/bugtraq/2019/Mar/22Mailing List, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202005-06Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4408Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/03/msg00022.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Mar/22Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202005-06Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4408Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BDFAC3-D07D-487F-AAA3-1CE56E69E8A8",
              "versionEndExcluding": "2019.02.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "D83DA865-E4A6-4FBF-AA1B-A969EBA6B2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function."
    },
    {
      "lang": "es",
      "value": "En Live555, antes del 27/02/2019, cabeceras mal formadas conducen a un acceso de memoria inv\u00e1lida en la funci\u00f3n parseAuthorizationHeader."
    }
  ],
  "id": "CVE-2019-9215",
  "lastModified": "2024-11-21T04:51:13.577",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-28T04:29:00.450",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Mar/22"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2019/dsa-4408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Mar/22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2019/dsa-4408"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-04 02:29
Modified
2024-11-21 04:47
Severity ?
Summary
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
References
cve@mitre.orghttp://lists.live555.com/pipermail/live-devel/2019-February/021143.htmlMailing List, Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html
cve@mitre.orghttp://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/02/msg00037.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://seclists.org/bugtraq/2019/Mar/22
cve@mitre.orghttps://security.gentoo.org/glsa/202005-06
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4408
af854a3a-2127-422b-91ae-364da2661108http://lists.live555.com/pipermail/live-devel/2019-February/021143.htmlMailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/02/msg00037.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Mar/22
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202005-06
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4408
Impacted products
Vendor Product Version
live555 streaming_media *
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF3B1D8-8081-4080-B68B-0AD7D4D3D1CC",
              "versionEndExcluding": "0.95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact."
    },
    {
      "lang": "es",
      "value": "liblivemedia en Live555, antes del 03/02/2019, gestiona de manera incorrecta la terminaci\u00f3n de una transmisi\u00f3n RTSP despu\u00e9s de que RTP/RTCP-over-RTSP se configura, lo que podr\u00eda provocar un error de uso de memoria previamente liberada que causa el cierre inesperado del servidor RTSP (fallo de segmentaci\u00f3n) o potencialmente tiene otro impacto no especificado."
    }
  ],
  "id": "CVE-2019-7314",
  "lastModified": "2024-11-21T04:47:59.560",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-04T02:29:00.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://seclists.org/bugtraq/2019/Mar/22"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2019/dsa-4408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Mar/22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202005-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2019/dsa-4408"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-23 21:55
Modified
2024-11-21 01:59
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.
Impacted products
Vendor Product Version
live555 streaming_media 2011-08-13
live555 streaming_media 2011-08-20
live555 streaming_media 2011-08-22
live555 streaming_media 2011-09-02
live555 streaming_media 2011-09-19
live555 streaming_media 2011-10-05
live555 streaming_media 2011-10-09
live555 streaming_media 2011-10-18
live555 streaming_media 2011-10-27
live555 streaming_media 2011-11-02
live555 streaming_media 2011-11-08
live555 streaming_media 2011-11-20
live555 streaming_media 2011-11-27
live555 streaming_media 2011-11-28
live555 streaming_media 2011-11-29
live555 streaming_media 2011-12-02
live555 streaming_media 2011-12-19
live555 streaming_media 2011-12-20
live555 streaming_media 2011-12-23
live555 streaming_media 2012-01-07
live555 streaming_media 2012-01-13
live555 streaming_media 2012-01-25
live555 streaming_media 2012-01-26
live555 streaming_media 2012-02-03
live555 streaming_media 2012-02-04
live555 streaming_media 2012-02-29
live555 streaming_media 2012-03-20
live555 streaming_media 2012-03-22
live555 streaming_media 2012-04-04
live555 streaming_media 2012-04-18
live555 streaming_media 2012-04-21
live555 streaming_media 2012-04-26
live555 streaming_media 2012-04-27
live555 streaming_media 2012-05-03
live555 streaming_media 2012-05-11
live555 streaming_media 2012-05-17
live555 streaming_media 2012-06-12
live555 streaming_media 2012-06-17
live555 streaming_media 2012-06-23
live555 streaming_media 2012-06-26
live555 streaming_media 2012-07-03
live555 streaming_media 2012-07-06
live555 streaming_media 2012-07-14
live555 streaming_media 2012-07-18
live555 streaming_media 2012-07-24
live555 streaming_media 2012-07-26
live555 streaming_media 2012-08-08
live555 streaming_media 2012-08-12
live555 streaming_media 2012-08-17
live555 streaming_media 2012-08-20
live555 streaming_media 2012-08-28
live555 streaming_media 2012-08-29
live555 streaming_media 2012-08-30
live555 streaming_media 2012-08-31
live555 streaming_media 2012-09-06
live555 streaming_media 2012-09-07
live555 streaming_media 2012-09-11
live555 streaming_media 2012-09-12
live555 streaming_media 2012-09-13
live555 streaming_media 2012-09-27
live555 streaming_media 2012-10-01
live555 streaming_media 2012-10-04
live555 streaming_media 2012-10-11
live555 streaming_media 2012-10-12
live555 streaming_media 2012-10-16
live555 streaming_media 2012-10-17
live555 streaming_media 2012-10-18
live555 streaming_media 2012-10-21
live555 streaming_media 2012-10-22
live555 streaming_media 2012-10-24
live555 streaming_media 2012-11-05
live555 streaming_media 2012-11-08
live555 streaming_media 2012-11-16
live555 streaming_media 2012-11-17
live555 streaming_media 2012-11-22
live555 streaming_media 2012-11-28
live555 streaming_media 2012-11-29
live555 streaming_media 2012-11-30
live555 streaming_media 2012-12-15
live555 streaming_media 2012-12-18
live555 streaming_media 2012-12-21
live555 streaming_media 2012-12-22
live555 streaming_media 2012-12-23
live555 streaming_media 2012-12-24
live555 streaming_media 2013-01-03
live555 streaming_media 2013-01-04
live555 streaming_media 2013-01-05
live555 streaming_media 2013-01-15
live555 streaming_media 2013-01-18
live555 streaming_media 2013-01-19
live555 streaming_media 2013-01-21
live555 streaming_media 2013-01-22
live555 streaming_media 2013-01-23
live555 streaming_media 2013-01-25
live555 streaming_media 2013-02-05
live555 streaming_media 2013-02-11
live555 streaming_media 2013-02-27
live555 streaming_media 2013-03-07
live555 streaming_media 2013-03-23
live555 streaming_media 2013-03-31
live555 streaming_media 2013-04-01
live555 streaming_media 2013-04-04
live555 streaming_media 2013-04-05
live555 streaming_media 2013-04-06
live555 streaming_media 2013-04-08
live555 streaming_media 2013-04-16
live555 streaming_media 2013-04-21
live555 streaming_media 2013-04-22
live555 streaming_media 2013-04-23
live555 streaming_media 2013-04-29
live555 streaming_media 2013-04-30
live555 streaming_media 2013-05-30
live555 streaming_media 2013-06-06
live555 streaming_media 2013-06-14
live555 streaming_media 2013-06-18
live555 streaming_media 2013-06-30
live555 streaming_media 2013-07-03
live555 streaming_media 2013-07-16
live555 streaming_media 2013-07-30
live555 streaming_media 2013-07-31
live555 streaming_media 2013-08-05
live555 streaming_media 2013-08-15
live555 streaming_media 2013-08-16
live555 streaming_media 2013-08-28
live555 streaming_media 2013-08-31
live555 streaming_media 2013-09-07
live555 streaming_media 2013-09-08
live555 streaming_media 2013-09-11
live555 streaming_media 2013-09-18
live555 streaming_media 2013-09-27
live555 streaming_media 2013-09-30
live555 streaming_media 2013-10-01
live555 streaming_media 2013-10-02
live555 streaming_media 2013-10-03
live555 streaming_media 2013-10-07
live555 streaming_media 2013-10-08
live555 streaming_media 2013-10-09
live555 streaming_media 2013-10-11
live555 streaming_media 2013-10-16
live555 streaming_media 2013-10-18
live555 streaming_media 2013-10-22
live555 streaming_media 2013-10-24
live555 streaming_media 2013-10-25
live555 streaming_media 2013-11-06
live555 streaming_media 2013-11-10
live555 streaming_media 2013-11-14
live555 streaming_media 2013-11-15
live555 streaming_media 2013-11-25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-08-13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45002A7-F124-431B-AA70-56229E1317A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-08-20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1CAC51-7C4C-42B9-8156-E20C4385BC3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-08-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF7B64A-6494-458B-9FB3-38A88D08EDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-09-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16C555C-3151-4FFC-B268-83DC402132C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-09-19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7377FA8-4D34-4BE4-9202-D70305A62CE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-10-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9B8790-AF24-488A-93C2-0901E4992BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-10-09:*:*:*:*:*:*:*",
              "matchCriteriaId": "408A3979-ED61-43C9-9F38-A37E62EBC834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-10-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7BB08A-2A7D-4045-B057-2F446701BDEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-10-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4211BB5-36B3-4CD0-8CB0-AD94DC89069B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5EEBB5-3475-4C83-AF1E-DC2C60BE9AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58FD629-EC62-48A7-837C-41E63A8E81B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A865F441-3309-45F4-8FE9-56BA1D8DC904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6FAF3F7-297D-49B2-A606-9DD42CD0CC41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-28:*:*:*:*:*:*:*",
              "matchCriteriaId": "365E8422-54C5-4C17-979C-92B7BDF5A483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-11-29:*:*:*:*:*:*:*",
              "matchCriteriaId": "6143D0D4-A079-44B9-A62D-2B934B0F9B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-12-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C05920-3B27-413F-89AF-528312411D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-12-19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E282208-3FEF-4BD3-B564-3C1DD310FA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-12-20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C551AB2-DEA7-46C7-A2F8-EF077A23F64E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2011-12-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F9FE29-7073-4810-B942-F2BE9F4D7B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-01-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05F8751-3319-49AF-878B-6BEA691B652C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-01-13:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CCB938-B838-49A7-A870-2DAF807D1BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-01-25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2D389E-A724-4C5F-AB89-E1B4B776F767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-01-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22B204A-34BB-43B6-B149-7DB6EF68465A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-02-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "41359A64-534C-48AA-A83F-3C67A97AD951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-02-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9D9EF4-3955-4F06-B2C1-9885033B6C93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-02-29:*:*:*:*:*:*:*",
              "matchCriteriaId": "22107008-9BFE-40BF-BFF2-97071713F705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-03-20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7607FB28-FE81-42AC-A9EC-9176D2328154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-03-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "408AEECF-6A81-4362-B8E8-459A0B3D93A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-04-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "819CD2BE-9E4F-4F2E-BC1A-DFA1948DE7C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-04-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA171CDE-C0F6-4F95-BBC0-00037FD6A279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-04-21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACDE24D-7EB7-4145-B06F-EEC1D0E21C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-04-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4345E1E-94F8-4EFA-A207-AE44E19D059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D0D99A-255C-482E-BEBB-18AB6831EE5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-05-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "301DC911-664A-450B-8224-7DAFEEAEAE00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-05-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75A91C9-60BA-4736-98A6-B7B1EF856298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-05-17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AE62B-C794-4A4D-98D0-5CFFE34E4C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-06-12:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D2DC4F-CC65-4397-8898-418A3A72A743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-06-17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA6C606-092B-4DA4-B0BD-436536156A1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-06-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "25AB9956-4EE8-44FE-BD6A-0334AE0D72CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-06-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "234283EC-9044-4B67-A5C3-C4C001617425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BB315D3-A712-47AE-88BF-78EFEE5C989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591CFB0-6555-4F62-AC84-FE1802DE5BBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-14:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A7723D-8A04-43FB-AA4D-815A3D2FE448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D1E140-20CE-435F-8687-2BDAAF0C0629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-24:*:*:*:*:*:*:*",
              "matchCriteriaId": "03C3D7F2-CABD-4416-8B97-04EC4CDE69BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-07-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "148C690D-E3F7-481F-9615-47269D77DB84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D82AF84-B20E-462A-B6F3-34C73002C7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AC27FF-849D-4FBE-A285-A49A975BADC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-17:*:*:*:*:*:*:*",
              "matchCriteriaId": "48BB8222-AFBA-46CD-93B0-D89160026C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-20:*:*:*:*:*:*:*",
              "matchCriteriaId": "82073CFD-5F7F-4B8A-A6E6-0763C5588FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-28:*:*:*:*:*:*:*",
              "matchCriteriaId": "4616FBAF-C807-4A2E-B406-6BBDB947EAB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3652119-67CF-40AF-B3D0-40CF67B32DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF68CA0-A754-4F84-8FE6-AD854FB94A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-08-31:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE80D63-1E2A-4AAB-A6CC-02FBAEE7FF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C14DFC-1C57-48E3-84E7-52520CA06B38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD037D-9F90-47DE-B658-FBFDC6D72590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "885F579E-4921-460B-B086-947D6D395E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CBE3E6-4D9D-4691-BB20-03C1CBFAF524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B6E3F3-917C-4AAA-9C4D-D31B32093B64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-09-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E28B3B-0DE2-4C8D-B0F2-792881C783EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0D25E5-5573-406D-96A0-97AAC1B2D2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFFE9F37-51BB-40B5-9689-4A913F3A7D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C98716-D615-4CC6-85A0-8FEBD4C66B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-12:*:*:*:*:*:*:*",
              "matchCriteriaId": "624C8DB6-ACB5-43A9-B2BB-AC9379532176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F7963-B3CA-4A93-89A1-49E3346B2C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-17:*:*:*:*:*:*:*",
              "matchCriteriaId": "643AA143-E7D3-4C7B-9C1A-0109EC4A9FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E75B333-4256-43AF-972B-0E2CA1C16F3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE6DA613-DDA6-436D-B292-C3123E67896D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B28E104E-718E-4844-807D-3AB19E745450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-10-24:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6FAD95-A908-4ABE-B79D-B4BC3E4F0A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0E84364-76D0-40A2-80DC-CF8059F9C8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "2743E88A-7597-4E4F-8117-00FD92C151AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8991D05-7738-45D2-9194-7A82EDDD23CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-17:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E3C636-6520-4FB7-ABAB-3E3CF9D013A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF97BA1-966A-4A5B-A7B6-9C519539D31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-28:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA38E0-1D63-4C27-8660-148755938656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-29:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C109135-BE9F-4A8A-9E11-7CC8BF61865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-11-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B47795D-1D08-4DEB-98A0-FEA0429733A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F93171-E67D-4237-8F78-C7C99129464C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E002F2D-EA2A-482D-9D1B-163B65945B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-21:*:*:*:*:*:*:*",
              "matchCriteriaId": "81BD15D0-6358-4D95-AD41-DD35C6018F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B023AE91-C984-4248-8A72-27DA625EBD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E2DAB59-5654-44CF-A59D-A403DA481B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2012-12-24:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD733052-9F7E-46C6-A8CF-9F3285914407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "185AB6DE-C619-4E5F-8527-939FC4DA6F29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DA2E4B-0C3B-4FFD-9E39-BA1914799F75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "687B7EFD-4360-4D21-BC41-3B30BC56DC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74612DF-3789-4B2B-9E5C-885D0ED5694C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0528143-59F1-4935-9ACC-E244E023329A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F819C1AB-A740-4B12-A24A-E3C8A1AC4ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-21:*:*:*:*:*:*:*",
              "matchCriteriaId": "8427A9A7-E1DA-49CD-B4D7-C7B28BC2A9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D446D9E6-FEAC-44EB-8BD2-06123A5707AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC79E8E-0E83-4925-965B-A36EE4DB62EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-01-25:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F886AC-41A5-4632-87AD-9AA8A2FE5442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-02-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C33655C-ADF7-4ECA-8B1D-608AFCBF6859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-02-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75EA3CA-18CC-4F1F-8F6F-2AF1B01FC035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-02-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE38C2B2-6018-4713-BCA1-F54D921E9E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-03-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D254451-D21B-47BF-B741-10AAD224158F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-03-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6E8FDED-C6AD-4387-BEA6-C76597BD56E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-03-31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C4E33E-B8FD-4894-A40D-53EDD1183F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCFEE9D6-9E7D-440C-B885-927CCC145F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1DAE9E-D010-4703-B27E-5028CD8E4BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C4D4E0-D759-41CE-B291-4E5F595B14B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2BF5EA-EEDD-46AA-9983-F100CD73E087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB88E5E-DC89-44B9-9D02-8DA95E83CE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B726220E-DDF1-475C-972A-62E37A93CD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-21:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A765DBD-AFC1-4516-BE00-DFED7A2101DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D037880F-345F-48B7-8A04-4DC317C54E59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8A9B5B-C622-4625-BD67-BDC4CE637B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-29:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8C271F-C431-4EE5-A09A-1E15A4F93876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-04-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DDCF4F-0587-4D02-A4E9-D1F83C3984F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-05-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A850872-3945-4D6F-B2B3-E9D7F89229AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-06-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA561AB-0613-47A5-A949-1768485EE26E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-06-14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCB9354-0EF3-4311-95E9-4CF2D1219C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-06-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D97303C-47CA-4D13-BF22-FDB183F00C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-06-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D8F54D-9479-4815-83E0-A4BE57791853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-07-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "641BE714-8505-460F-B640-96B75C02EDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-07-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF158FC-6142-4FD2-9488-CC9C4A9F3A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-07-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21FF1062-3B6E-4D9C-B1C3-C101024714F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-07-31:*:*:*:*:*:*:*",
              "matchCriteriaId": "549A17E1-26A6-431F-9F3A-AFA2283903B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-08-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA2C834-B47E-4072-ABB9-A1932CD812A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-08-15:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C9ED67-5436-4C5A-888A-375EAF7E90F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-08-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FB4B630-CAB2-4A04-9A3E-93ADEA354137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-08-28:*:*:*:*:*:*:*",
              "matchCriteriaId": "6903E6A0-F635-451C-AAE9-B65EF193285E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-08-31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D6137-DCDA-4C06-B313-14C3CE70C688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA25A92-102D-4AD0-95D8-4D560ABCAB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D34CABE-E94C-4099-A1A4-E8924999396B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E551C1-53CC-4710-9BBF-A2D963A895E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A1A1AF-EA59-48F2-9C2D-A4932410A9C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E43D7E60-F1E1-4F0A-8FEE-ADFAF50FC4C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-09-30:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E686148-D7BE-431B-BEA3-728D07E3F4A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E3FB98-5244-48C8-9D5F-A369DC241171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DBF533-EE8C-42BC-B3BE-EE26239F35C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB2023C-351A-414B-9644-E58AD4770652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE99061E-1BE0-4288-8716-2DA7ADA35590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFE9064-D78C-48FF-8F3C-BE1D0EB62F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-09:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDDCFFF-F199-47F7-9BF2-D0BFBF089D4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4B49E0-9D17-476C-AF28-18E127E20BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-16:*:*:*:*:*:*:*",
              "matchCriteriaId": "46648DEC-C6F4-483A-B54F-1B1F28F72C9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-18:*:*:*:*:*:*:*",
              "matchCriteriaId": "D998881F-71F9-46F7-A321-EC59D0CCCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61BFD6F-71DB-4B78-A706-D20420168194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F64B625-03DB-4303-9DF5-64950424A851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-10-25:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FE1F55-879F-4A20-A00C-91F629B8327D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73E3573-8106-47DD-9805-CE83B511B520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8175E96-F154-46F8-A36D-A54FAE855DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8770BE3D-E999-4F28-ABA0-513485371A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC044B52-01E2-4E64-B3A1-1D5B9986BF58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:live555:streaming_media:2013-11-25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FE98301-634B-4FD8-9DDC-F60D4320AB50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n parseRTSPRequestString en Live Networks Live555 Streaming Media 2011.08.13 hasta la versi\u00f3n 2013.11.25, tal como se usa en VideoLAN VLC Media Player, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de (1) un espacio o (2) un car\u00e1cter de tabulaci\u00f3n en el comienzo de un mensaje RTSP, lo que desencadena en un underflow de enteros, bucle infinito, y desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2013-6933",
  "lastModified": "2024-11-21T01:59:59.777",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-23T21:55:04.913",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.live555.com/liveMedia/public/changelog.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        },
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}