Vulnerabilites related to live555 - streaming_media
Vulnerability from fkie_nvd
Published
2019-08-20 00:15
Modified
2024-11-21 04:28
Severity ?
Summary
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.
Impacted products
Vendor Product Version
live555 streaming_media *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "485C442E-F46F-4515-A1A2-3044CFEAF01D",
                     versionEndExcluding: "2019-08-16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.",
      },
      {
         lang: "es",
         value: "Live555 versiones anteriores a 2019.08.16, presenta un uso de la memoria previamente liberada porque la función GenericMediaServer::createNewClientSessionWithId puede generar el mismo ID de sesión de cliente en sucesión, el cual es manejado inapropiadamente por los demultiplexores de archivos MPEG1or2 y Matroska.",
      },
   ],
   id: "CVE-2019-15232",
   lastModified: "2024-11-21T04:28:15.320",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-20T00:15:10.237",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202005-06",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-01-23 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.
Impacted products
Vendor Product Version
live555 streaming_media 2011-08-13
live555 streaming_media 2011-08-20
live555 streaming_media 2011-08-22
live555 streaming_media 2011-09-02
live555 streaming_media 2011-09-19
live555 streaming_media 2011-10-05
live555 streaming_media 2011-10-09
live555 streaming_media 2011-10-18
live555 streaming_media 2011-10-27
live555 streaming_media 2011-11-02
live555 streaming_media 2011-11-08
live555 streaming_media 2011-11-20
live555 streaming_media 2011-11-27
live555 streaming_media 2011-11-28
live555 streaming_media 2011-11-29
live555 streaming_media 2011-12-02
live555 streaming_media 2011-12-19
live555 streaming_media 2011-12-20
live555 streaming_media 2011-12-23
live555 streaming_media 2012-01-07
live555 streaming_media 2012-01-13
live555 streaming_media 2012-01-25
live555 streaming_media 2012-01-26
live555 streaming_media 2012-02-03
live555 streaming_media 2012-02-04
live555 streaming_media 2012-02-29
live555 streaming_media 2012-03-20
live555 streaming_media 2012-03-22
live555 streaming_media 2012-04-04
live555 streaming_media 2012-04-18
live555 streaming_media 2012-04-21
live555 streaming_media 2012-04-26
live555 streaming_media 2012-04-27
live555 streaming_media 2012-05-03
live555 streaming_media 2012-05-11
live555 streaming_media 2012-05-17
live555 streaming_media 2012-06-12
live555 streaming_media 2012-06-17
live555 streaming_media 2012-06-23
live555 streaming_media 2012-06-26
live555 streaming_media 2012-07-03
live555 streaming_media 2012-07-06
live555 streaming_media 2012-07-14
live555 streaming_media 2012-07-18
live555 streaming_media 2012-07-24
live555 streaming_media 2012-07-26
live555 streaming_media 2012-08-08
live555 streaming_media 2012-08-12
live555 streaming_media 2012-08-17
live555 streaming_media 2012-08-20
live555 streaming_media 2012-08-28
live555 streaming_media 2012-08-29
live555 streaming_media 2012-08-30
live555 streaming_media 2012-08-31
live555 streaming_media 2012-09-06
live555 streaming_media 2012-09-07
live555 streaming_media 2012-09-11
live555 streaming_media 2012-09-12
live555 streaming_media 2012-09-13
live555 streaming_media 2012-09-27
live555 streaming_media 2012-10-01
live555 streaming_media 2012-10-04
live555 streaming_media 2012-10-11
live555 streaming_media 2012-10-12
live555 streaming_media 2012-10-16
live555 streaming_media 2012-10-17
live555 streaming_media 2012-10-18
live555 streaming_media 2012-10-21
live555 streaming_media 2012-10-22
live555 streaming_media 2012-10-24
live555 streaming_media 2012-11-05
live555 streaming_media 2012-11-08
live555 streaming_media 2012-11-16
live555 streaming_media 2012-11-17
live555 streaming_media 2012-11-22
live555 streaming_media 2012-11-28
live555 streaming_media 2012-11-29
live555 streaming_media 2012-11-30
live555 streaming_media 2012-12-15
live555 streaming_media 2012-12-18
live555 streaming_media 2012-12-21
live555 streaming_media 2012-12-22
live555 streaming_media 2012-12-23
live555 streaming_media 2012-12-24
live555 streaming_media 2013-01-03
live555 streaming_media 2013-01-04
live555 streaming_media 2013-01-05
live555 streaming_media 2013-01-15
live555 streaming_media 2013-01-18
live555 streaming_media 2013-01-19
live555 streaming_media 2013-01-21
live555 streaming_media 2013-01-22
live555 streaming_media 2013-01-23
live555 streaming_media 2013-01-25
live555 streaming_media 2013-02-05
live555 streaming_media 2013-02-11
live555 streaming_media 2013-02-27
live555 streaming_media 2013-03-07
live555 streaming_media 2013-03-23
live555 streaming_media 2013-03-31
live555 streaming_media 2013-04-01
live555 streaming_media 2013-04-04
live555 streaming_media 2013-04-05
live555 streaming_media 2013-04-06
live555 streaming_media 2013-04-08
live555 streaming_media 2013-04-16
live555 streaming_media 2013-04-21
live555 streaming_media 2013-04-22
live555 streaming_media 2013-04-23
live555 streaming_media 2013-04-29
live555 streaming_media 2013-04-30
live555 streaming_media 2013-05-30
live555 streaming_media 2013-06-06
live555 streaming_media 2013-06-14
live555 streaming_media 2013-06-18
live555 streaming_media 2013-06-30
live555 streaming_media 2013-07-03
live555 streaming_media 2013-07-16
live555 streaming_media 2013-07-30
live555 streaming_media 2013-07-31
live555 streaming_media 2013-08-05
live555 streaming_media 2013-08-15
live555 streaming_media 2013-08-16
live555 streaming_media 2013-08-28
live555 streaming_media 2013-08-31
live555 streaming_media 2013-09-07
live555 streaming_media 2013-09-08
live555 streaming_media 2013-09-11
live555 streaming_media 2013-09-18
live555 streaming_media 2013-09-27
live555 streaming_media 2013-09-30
live555 streaming_media 2013-10-01
live555 streaming_media 2013-10-02
live555 streaming_media 2013-10-03
live555 streaming_media 2013-10-07
live555 streaming_media 2013-10-08
live555 streaming_media 2013-10-09
live555 streaming_media 2013-10-11
live555 streaming_media 2013-10-16
live555 streaming_media 2013-10-18
live555 streaming_media 2013-10-22
live555 streaming_media 2013-10-24
live555 streaming_media 2013-10-25
live555 streaming_media 2013-11-06
live555 streaming_media 2013-11-10
live555 streaming_media 2013-11-14
live555 streaming_media 2013-11-15
live555 streaming_media 2013-11-25



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-08-13:*:*:*:*:*:*:*",
                     matchCriteriaId: "A45002A7-F124-431B-AA70-56229E1317A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-08-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1CAC51-7C4C-42B9-8156-E20C4385BC3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-08-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BF7B64A-6494-458B-9FB3-38A88D08EDC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-09-02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16C555C-3151-4FFC-B268-83DC402132C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-09-19:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7377FA8-4D34-4BE4-9202-D70305A62CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-10-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C9B8790-AF24-488A-93C2-0901E4992BDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-10-09:*:*:*:*:*:*:*",
                     matchCriteriaId: "408A3979-ED61-43C9-9F38-A37E62EBC834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-10-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E7BB08A-2A7D-4045-B057-2F446701BDEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-10-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4211BB5-36B3-4CD0-8CB0-AD94DC89069B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-02:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB5EEBB5-3475-4C83-AF1E-DC2C60BE9AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58FD629-EC62-48A7-837C-41E63A8E81B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A865F441-3309-45F4-8FE9-56BA1D8DC904",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6FAF3F7-297D-49B2-A606-9DD42CD0CC41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-28:*:*:*:*:*:*:*",
                     matchCriteriaId: "365E8422-54C5-4C17-979C-92B7BDF5A483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-11-29:*:*:*:*:*:*:*",
                     matchCriteriaId: "6143D0D4-A079-44B9-A62D-2B934B0F9B20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-12-02:*:*:*:*:*:*:*",
                     matchCriteriaId: "94C05920-3B27-413F-89AF-528312411D29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-12-19:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E282208-3FEF-4BD3-B564-3C1DD310FA05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-12-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C551AB2-DEA7-46C7-A2F8-EF077A23F64E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2011-12-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0F9FE29-7073-4810-B942-F2BE9F4D7B6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-01-07:*:*:*:*:*:*:*",
                     matchCriteriaId: "B05F8751-3319-49AF-878B-6BEA691B652C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-01-13:*:*:*:*:*:*:*",
                     matchCriteriaId: "00CCB938-B838-49A7-A870-2DAF807D1BBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-01-25:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F2D389E-A724-4C5F-AB89-E1B4B776F767",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-01-26:*:*:*:*:*:*:*",
                     matchCriteriaId: "B22B204A-34BB-43B6-B149-7DB6EF68465A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-02-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "41359A64-534C-48AA-A83F-3C67A97AD951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-02-04:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD9D9EF4-3955-4F06-B2C1-9885033B6C93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-02-29:*:*:*:*:*:*:*",
                     matchCriteriaId: "22107008-9BFE-40BF-BFF2-97071713F705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-03-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7607FB28-FE81-42AC-A9EC-9176D2328154",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-03-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "408AEECF-6A81-4362-B8E8-459A0B3D93A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-04-04:*:*:*:*:*:*:*",
                     matchCriteriaId: "819CD2BE-9E4F-4F2E-BC1A-DFA1948DE7C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-04-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA171CDE-C0F6-4F95-BBC0-00037FD6A279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-04-21:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACDE24D-7EB7-4145-B06F-EEC1D0E21C11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-04-26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4345E1E-94F8-4EFA-A207-AE44E19D059E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-04-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "39D0D99A-255C-482E-BEBB-18AB6831EE5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-05-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "301DC911-664A-450B-8224-7DAFEEAEAE00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-05-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75A91C9-60BA-4736-98A6-B7B1EF856298",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-05-17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AE62B-C794-4A4D-98D0-5CFFE34E4C6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-06-12:*:*:*:*:*:*:*",
                     matchCriteriaId: "30D2DC4F-CC65-4397-8898-418A3A72A743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-06-17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA6C606-092B-4DA4-B0BD-436536156A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-06-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AB9956-4EE8-44FE-BD6A-0334AE0D72CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-06-26:*:*:*:*:*:*:*",
                     matchCriteriaId: "234283EC-9044-4B67-A5C3-C4C001617425",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB315D3-A712-47AE-88BF-78EFEE5C989E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-06:*:*:*:*:*:*:*",
                     matchCriteriaId: "7591CFB0-6555-4F62-AC84-FE1802DE5BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-14:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A7723D-8A04-43FB-AA4D-815A3D2FE448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "96D1E140-20CE-435F-8687-2BDAAF0C0629",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-24:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C3D7F2-CABD-4416-8B97-04EC4CDE69BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-07-26:*:*:*:*:*:*:*",
                     matchCriteriaId: "148C690D-E3F7-481F-9615-47269D77DB84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D82AF84-B20E-462A-B6F3-34C73002C7EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-12:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2AC27FF-849D-4FBE-A285-A49A975BADC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-17:*:*:*:*:*:*:*",
                     matchCriteriaId: "48BB8222-AFBA-46CD-93B0-D89160026C75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "82073CFD-5F7F-4B8A-A6E6-0763C5588FDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-28:*:*:*:*:*:*:*",
                     matchCriteriaId: "4616FBAF-C807-4A2E-B406-6BBDB947EAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-29:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3652119-67CF-40AF-B3D0-40CF67B32DE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDF68CA0-A754-4F84-8FE6-AD854FB94A24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-08-31:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DE80D63-1E2A-4AAB-A6CC-02FBAEE7FF53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-06:*:*:*:*:*:*:*",
                     matchCriteriaId: "96C14DFC-1C57-48E3-84E7-52520CA06B38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-07:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBBD037D-9F90-47DE-B658-FBFDC6D72590",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "885F579E-4921-460B-B086-947D6D395E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CBE3E6-4D9D-4691-BB20-03C1CBFAF524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-13:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B6E3F3-917C-4AAA-9C4D-D31B32093B64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-09-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E28B3B-0DE2-4C8D-B0F2-792881C783EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD0D25E5-5573-406D-96A0-97AAC1B2D2C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-04:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFFE9F37-51BB-40B5-9689-4A913F3A7D69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C98716-D615-4CC6-85A0-8FEBD4C66B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-12:*:*:*:*:*:*:*",
                     matchCriteriaId: "624C8DB6-ACB5-43A9-B2BB-AC9379532176",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F7963-B3CA-4A93-89A1-49E3346B2C67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-17:*:*:*:*:*:*:*",
                     matchCriteriaId: "643AA143-E7D3-4C7B-9C1A-0109EC4A9FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E75B333-4256-43AF-972B-0E2CA1C16F3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-21:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6DA613-DDA6-436D-B292-C3123E67896D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "B28E104E-718E-4844-807D-3AB19E745450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-10-24:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B6FAD95-A908-4ABE-B79D-B4BC3E4F0A42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E84364-76D0-40A2-80DC-CF8059F9C8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "2743E88A-7597-4E4F-8117-00FD92C151AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8991D05-7738-45D2-9194-7A82EDDD23CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-17:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E3C636-6520-4FB7-ABAB-3E3CF9D013A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CF97BA1-966A-4A5B-A7B6-9C519539D31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-28:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBEA38E0-1D63-4C27-8660-148755938656",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-29:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C109135-BE9F-4A8A-9E11-7CC8BF61865A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-11-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B47795D-1D08-4DEB-98A0-FEA0429733A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-15:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F93171-E67D-4237-8F78-C7C99129464C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E002F2D-EA2A-482D-9D1B-163B65945B59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-21:*:*:*:*:*:*:*",
                     matchCriteriaId: "81BD15D0-6358-4D95-AD41-DD35C6018F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "B023AE91-C984-4248-8A72-27DA625EBD0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E2DAB59-5654-44CF-A59D-A403DA481B59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2012-12-24:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD733052-9F7E-46C6-A8CF-9F3285914407",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "185AB6DE-C619-4E5F-8527-939FC4DA6F29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-04:*:*:*:*:*:*:*",
                     matchCriteriaId: "96DA2E4B-0C3B-4FFD-9E39-BA1914799F75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "687B7EFD-4360-4D21-BC41-3B30BC56DC0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-15:*:*:*:*:*:*:*",
                     matchCriteriaId: "D74612DF-3789-4B2B-9E5C-885D0ED5694C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0528143-59F1-4935-9ACC-E244E023329A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F819C1AB-A740-4B12-A24A-E3C8A1AC4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-21:*:*:*:*:*:*:*",
                     matchCriteriaId: "8427A9A7-E1DA-49CD-B4D7-C7B28BC2A9F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "D446D9E6-FEAC-44EB-8BD2-06123A5707AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFC79E8E-0E83-4925-965B-A36EE4DB62EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-01-25:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4F886AC-41A5-4632-87AD-9AA8A2FE5442",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-02-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C33655C-ADF7-4ECA-8B1D-608AFCBF6859",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-02-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "C75EA3CA-18CC-4F1F-8F6F-2AF1B01FC035",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-02-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE38C2B2-6018-4713-BCA1-F54D921E9E6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-03-07:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D254451-D21B-47BF-B741-10AAD224158F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-03-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6E8FDED-C6AD-4387-BEA6-C76597BD56E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-03-31:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C4E33E-B8FD-4894-A40D-53EDD1183F2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-01:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCFEE9D6-9E7D-440C-B885-927CCC145F5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-04:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB1DAE9E-D010-4703-B27E-5028CD8E4BF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5C4D4E0-D759-41CE-B291-4E5F595B14B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-06:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2BF5EA-EEDD-46AA-9983-F100CD73E087",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCB88E5E-DC89-44B9-9D02-8DA95E83CE90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "B726220E-DDF1-475C-972A-62E37A93CD26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-21:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A765DBD-AFC1-4516-BE00-DFED7A2101DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "D037880F-345F-48B7-8A04-4DC317C54E59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-23:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB8A9B5B-C622-4625-BD67-BDC4CE637B20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-29:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B8C271F-C431-4EE5-A09A-1E15A4F93876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-04-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "58DDCF4F-0587-4D02-A4E9-D1F83C3984F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-05-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A850872-3945-4D6F-B2B3-E9D7F89229AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-06-06:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA561AB-0613-47A5-A949-1768485EE26E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-06-14:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFCB9354-0EF3-4311-95E9-4CF2D1219C43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-06-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D97303C-47CA-4D13-BF22-FDB183F00C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-06-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "10D8F54D-9479-4815-83E0-A4BE57791853",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-07-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "641BE714-8505-460F-B640-96B75C02EDE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-07-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF158FC-6142-4FD2-9488-CC9C4A9F3A73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-07-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FF1062-3B6E-4D9C-B1C3-C101024714F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-07-31:*:*:*:*:*:*:*",
                     matchCriteriaId: "549A17E1-26A6-431F-9F3A-AFA2283903B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-08-05:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA2C834-B47E-4072-ABB9-A1932CD812A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-08-15:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C9ED67-5436-4C5A-888A-375EAF7E90F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-08-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FB4B630-CAB2-4A04-9A3E-93ADEA354137",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-08-28:*:*:*:*:*:*:*",
                     matchCriteriaId: "6903E6A0-F635-451C-AAE9-B65EF193285E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-08-31:*:*:*:*:*:*:*",
                     matchCriteriaId: "B43D6137-DCDA-4C06-B313-14C3CE70C688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-07:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DA25A92-102D-4AD0-95D8-4D560ABCAB08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D34CABE-E94C-4099-A1A4-E8924999396B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "83E551C1-53CC-4710-9BBF-A2D963A895E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4A1A1AF-EA59-48F2-9C2D-A4932410A9C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-27:*:*:*:*:*:*:*",
                     matchCriteriaId: "E43D7E60-F1E1-4F0A-8FEE-ADFAF50FC4C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-09-30:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E686148-D7BE-431B-BEA3-728D07E3F4A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-01:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E3FB98-5244-48C8-9D5F-A369DC241171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-02:*:*:*:*:*:*:*",
                     matchCriteriaId: "52DBF533-EE8C-42BC-B3BE-EE26239F35C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-03:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB2023C-351A-414B-9644-E58AD4770652",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-07:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE99061E-1BE0-4288-8716-2DA7ADA35590",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-08:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFE9064-D78C-48FF-8F3C-BE1D0EB62F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-09:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CDDCFFF-F199-47F7-9BF2-D0BFBF089D4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-11:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4B49E0-9D17-476C-AF28-18E127E20BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-16:*:*:*:*:*:*:*",
                     matchCriteriaId: "46648DEC-C6F4-483A-B54F-1B1F28F72C9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-18:*:*:*:*:*:*:*",
                     matchCriteriaId: "D998881F-71F9-46F7-A321-EC59D0CCCED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-22:*:*:*:*:*:*:*",
                     matchCriteriaId: "A61BFD6F-71DB-4B78-A706-D20420168194",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-24:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F64B625-03DB-4303-9DF5-64950424A851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-10-25:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6FE1F55-879F-4A20-A00C-91F629B8327D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-06:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73E3573-8106-47DD-9805-CE83B511B520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8175E96-F154-46F8-A36D-A54FAE855DF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-14:*:*:*:*:*:*:*",
                     matchCriteriaId: "8770BE3D-E999-4F28-ABA0-513485371A6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-15:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC044B52-01E2-4E64-B3A1-1D5B9986BF58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-25:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE98301-634B-4FD8-9DDC-F60D4320AB50",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.",
      },
      {
         lang: "es",
         value: "La función parseRTSPRequestString en Live Networks Live555 Streaming Media 2011.08.13 hasta la versión 2013.11.25, tal como se usa en VideoLAN VLC Media Player, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de (1) un espacio o (2) un carácter de tabulación en el comienzo de un mensaje RTSP, lo que desencadena en un underflow de enteros, bucle infinito, y desbordamiento de búfer.",
      },
   ],
   id: "CVE-2013-6933",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-01-23T21:55:04.913",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-11 17:29
Modified
2024-11-21 04:48
Summary
In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.
Impacted products
Vendor Product Version
live555 streaming_media 0.95



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EFF72B-05B5-48D0-B5AA-C8BFD85F2CBE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.",
      },
      {
         lang: "es",
         value: "En Live555 0.95, hay un desbordamiento de búfer mediante un entero largo en una cabecera HTTP Content-Length debido a que handleRequestBytes tiene un memmove no restringido.",
      },
   ],
   id: "CVE-2019-7733",
   lastModified: "2024-11-21T04:48:36.547",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-11T17:29:00.490",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/rgaufman/live555/issues/21",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/rgaufman/live555/issues/21",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202005-06",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-04 02:29
Modified
2024-11-21 04:47
Severity ?
Summary
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
References
cve@mitre.orghttp://lists.live555.com/pipermail/live-devel/2019-February/021143.htmlMailing List, Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html
cve@mitre.orghttp://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/02/msg00037.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://seclists.org/bugtraq/2019/Mar/22
cve@mitre.orghttps://security.gentoo.org/glsa/202005-06
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4408
af854a3a-2127-422b-91ae-364da2661108http://lists.live555.com/pipermail/live-devel/2019-February/021143.htmlMailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/02/msg00037.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Mar/22
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202005-06
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4408
Impacted products
Vendor Product Version
live555 streaming_media *
debian debian_linux 8.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF3B1D8-8081-4080-B68B-0AD7D4D3D1CC",
                     versionEndExcluding: "0.95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.",
      },
      {
         lang: "es",
         value: "liblivemedia en Live555, antes del 03/02/2019, gestiona de manera incorrecta la terminación de una transmisión RTSP después de que RTP/RTCP-over-RTSP se configura, lo que podría provocar un error de uso de memoria previamente liberada que causa el cierre inesperado del servidor RTSP (fallo de segmentación) o potencialmente tiene otro impacto no especificado.",
      },
   ],
   id: "CVE-2019-7314",
   lastModified: "2024-11-21T04:47:59.560",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-04T02:29:00.247",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Mar/22",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4408",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Mar/22",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4408",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-28 04:29
Modified
2024-11-21 04:51
Severity ?
Summary
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/03/msg00022.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://seclists.org/bugtraq/2019/Mar/22Mailing List, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202005-06Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4408Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.live555.com/liveMedia/public/changelog.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/03/msg00022.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Mar/22Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202005-06Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4408Third Party Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52BDFAC3-D07D-487F-AAA3-1CE56E69E8A8",
                     versionEndExcluding: "2019.02.27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "D83DA865-E4A6-4FBF-AA1B-A969EBA6B2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "40513095-7E6E-46B3-B604-C926F1BA3568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.",
      },
      {
         lang: "es",
         value: "En Live555, antes del 27/02/2019, cabeceras mal formadas conducen a un acceso de memoria inválida en la función parseAuthorizationHeader.",
      },
   ],
   id: "CVE-2019-9215",
   lastModified: "2024-11-21T04:51:13.577",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-28T04:29:00.450",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Mar/22",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4408",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Mar/22",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202005-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4408",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-04-29 15:15
Modified
2024-11-21 06:00
Summary
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
Impacted products
Vendor Product Version
live555 streaming_media *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A3FA48C-510C-481C-8091-C3FF9412F577",
                     versionEndExcluding: "2021.3.16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en las subclases AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession y AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession en redes LIVE555 Streaming Media versiones anteriores a 2021.3.16",
      },
   ],
   id: "CVE-2021-28899",
   lastModified: "2024-11-21T06:00:21.980",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-29T15:15:10.987",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-11 17:29
Modified
2024-11-21 04:48
Summary
In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.
Impacted products
Vendor Product Version
live555 streaming_media 0.95



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EFF72B-05B5-48D0-B5AA-C8BFD85F2CBE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.",
      },
      {
         lang: "es",
         value: "En Live555 0.95, un paquete de instalación puede provocar una fuga de memoria y una denegación de servicio (DoS). Esto se debe a que, cuando hay múltiples instancias de un único campo (username, realm, nonce, uri o response), solo se puede liberar la última instancia.",
      },
   ],
   id: "CVE-2019-7732",
   lastModified: "2024-11-21T04:48:36.400",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-11T17:29:00.443",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/rgaufman/live555/issues/20",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/rgaufman/live555/issues/20",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-01-23 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.
Impacted products
Vendor Product Version
live555 streaming_media 2013-11-26
videolan vlc_media_player *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:live555:streaming_media:2013-11-26:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCB033D9-C10C-428C-A7EF-DCF113967A19",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC766DE-C9B4-4067-B90F-37DBB63EEFE0",
                     versionEndExcluding: "2.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.",
      },
      {
         lang: "es",
         value: "La función parseRTSPRequestString en Live Networks Live555 Streaming Media 2013.11.26, tal como se usa en VideoLAN VLC Media Player, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un carácter en blanco en el comienzo de un mensaje RTSP, lo que desencadena en un underflow de enteros, bucle infinito, y desbordamiento de búfer. NOTA: esta vulnerabilidad existe por una solución incompleta en CVE-2013-6933.",
      },
   ],
   id: "CVE-2013-6934",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-01-23T21:55:04.947",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/65139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.live555.com/liveMedia/public/changelog.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/65139",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2019-7314
Vulnerability from cvelistv5
Published
2019-02-04 02:00
Modified
2024-08-04 20:46
Severity ?
Summary
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:46:46.132Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.live555.com/liveMedia/public/changelog.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
               },
               {
                  name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Mar/22",
               },
               {
                  name: "DSA-4408",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4408",
               },
               {
                  name: "openSUSE-SU-2019:1797",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
               },
               {
                  name: "openSUSE-SU-2019:1880",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
               },
               {
                  name: "GLSA-202005-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202005-06",
               },
               {
                  name: "openSUSE-SU-2020:0944",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-02-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-07T05:06:09",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.live555.com/liveMedia/public/changelog.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
            },
            {
               name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Mar/22",
            },
            {
               name: "DSA-4408",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4408",
            },
            {
               name: "openSUSE-SU-2019:1797",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
            },
            {
               name: "openSUSE-SU-2019:1880",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
            },
            {
               name: "GLSA-202005-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202005-06",
            },
            {
               name: "openSUSE-SU-2020:0944",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-7314",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[debian-lts-announce] 20190226 [SECURITY] [DLA 1690-1] liblivemedia security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html",
                  },
                  {
                     name: "http://www.live555.com/liveMedia/public/changelog.txt",
                     refsource: "MISC",
                     url: "http://www.live555.com/liveMedia/public/changelog.txt",
                  },
                  {
                     name: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
                     refsource: "MISC",
                     url: "http://lists.live555.com/pipermail/live-devel/2019-February/021143.html",
                  },
                  {
                     name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Mar/22",
                  },
                  {
                     name: "DSA-4408",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4408",
                  },
                  {
                     name: "openSUSE-SU-2019:1797",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
                  },
                  {
                     name: "openSUSE-SU-2019:1880",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
                  },
                  {
                     name: "GLSA-202005-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202005-06",
                  },
                  {
                     name: "openSUSE-SU-2020:0944",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-7314",
      datePublished: "2019-02-04T02:00:00",
      dateReserved: "2019-02-03T00:00:00",
      dateUpdated: "2024-08-04T20:46:46.132Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-15232
Vulnerability from cvelistv5
Published
2019-08-19 23:57
Modified
2024-08-05 00:42
Severity ?
Summary
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.
References
http://www.live555.com/liveMedia/public/changelog.txtx_refsource_MISC
https://security.gentoo.org/glsa/202005-06vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:42:04.063Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.live555.com/liveMedia/public/changelog.txt",
               },
               {
                  name: "GLSA-202005-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202005-06",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-14T23:06:16",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.live555.com/liveMedia/public/changelog.txt",
            },
            {
               name: "GLSA-202005-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202005-06",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-15232",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.live555.com/liveMedia/public/changelog.txt",
                     refsource: "MISC",
                     url: "http://www.live555.com/liveMedia/public/changelog.txt",
                  },
                  {
                     name: "GLSA-202005-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202005-06",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-15232",
      datePublished: "2019-08-19T23:57:37",
      dateReserved: "2019-08-19T00:00:00",
      dateUpdated: "2024-08-05T00:42:04.063Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-7733
Vulnerability from cvelistv5
Published
2019-02-11 17:00
Modified
2024-08-04 20:54
Severity ?
Summary
In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.
References
https://github.com/rgaufman/live555/issues/21x_refsource_MISC
https://security.gentoo.org/glsa/202005-06vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:54:28.439Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/rgaufman/live555/issues/21",
               },
               {
                  name: "GLSA-202005-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202005-06",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-02-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-14T23:06:19",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/rgaufman/live555/issues/21",
            },
            {
               name: "GLSA-202005-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202005-06",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-7733",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/rgaufman/live555/issues/21",
                     refsource: "MISC",
                     url: "https://github.com/rgaufman/live555/issues/21",
                  },
                  {
                     name: "GLSA-202005-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202005-06",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-7733",
      datePublished: "2019-02-11T17:00:00",
      dateReserved: "2019-02-11T00:00:00",
      dateUpdated: "2024-08-04T20:54:28.439Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-28899
Vulnerability from cvelistv5
Published
2021-04-29 14:08
Modified
2024-08-03 21:55
Severity ?
Summary
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T21:55:11.671Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-04-29T14:08:31",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-28899",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
                     refsource: "MISC",
                     url: "http://lists.live555.com/pipermail/live-devel/2021-March/021891.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-28899",
      datePublished: "2021-04-29T14:08:31",
      dateReserved: "2021-03-19T00:00:00",
      dateUpdated: "2024-08-03T21:55:11.671Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-9215
Vulnerability from cvelistv5
Published
2019-02-28 04:00
Modified
2024-08-04 21:38
Severity ?
Summary
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T21:38:46.622Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.live555.com/liveMedia/public/changelog.txt",
               },
               {
                  name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Mar/22",
               },
               {
                  name: "DSA-4408",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4408",
               },
               {
                  name: "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html",
               },
               {
                  name: "openSUSE-SU-2019:1797",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
               },
               {
                  name: "openSUSE-SU-2019:1880",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
               },
               {
                  name: "GLSA-202005-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202005-06",
               },
               {
                  name: "openSUSE-SU-2020:0944",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-02-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-07T05:06:08",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.live555.com/liveMedia/public/changelog.txt",
            },
            {
               name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Mar/22",
            },
            {
               name: "DSA-4408",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4408",
            },
            {
               name: "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html",
            },
            {
               name: "openSUSE-SU-2019:1797",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
            },
            {
               name: "openSUSE-SU-2019:1880",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
            },
            {
               name: "GLSA-202005-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202005-06",
            },
            {
               name: "openSUSE-SU-2020:0944",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-9215",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.live555.com/liveMedia/public/changelog.txt",
                     refsource: "MISC",
                     url: "http://www.live555.com/liveMedia/public/changelog.txt",
                  },
                  {
                     name: "20190317 [SECURITY] [DSA 4408-1] liblivemedia security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Mar/22",
                  },
                  {
                     name: "DSA-4408",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4408",
                  },
                  {
                     name: "[debian-lts-announce] 20190318 [SECURITY] [DLA 1720-1] liblivemedia security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00022.html",
                  },
                  {
                     name: "openSUSE-SU-2019:1797",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html",
                  },
                  {
                     name: "openSUSE-SU-2019:1880",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html",
                  },
                  {
                     name: "GLSA-202005-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202005-06",
                  },
                  {
                     name: "openSUSE-SU-2020:0944",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-9215",
      datePublished: "2019-02-28T04:00:00",
      dateReserved: "2019-02-27T00:00:00",
      dateUpdated: "2024-08-04T21:38:46.622Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-6934
Vulnerability from cvelistv5
Published
2014-01-23 21:00
Modified
2024-08-06 17:53
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T17:53:45.351Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "65139",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/65139",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.live555.com/liveMedia/public/changelog.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-11-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "65139",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/65139",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.live555.com/liveMedia/public/changelog.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2013-6934",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6933.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "65139",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/65139",
                  },
                  {
                     name: "http://www.live555.com/liveMedia/public/changelog.txt",
                     refsource: "CONFIRM",
                     url: "http://www.live555.com/liveMedia/public/changelog.txt",
                  },
                  {
                     name: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
                     refsource: "MISC",
                     url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2013-6934",
      datePublished: "2014-01-23T21:00:00",
      dateReserved: "2013-12-03T00:00:00",
      dateUpdated: "2024-08-06T17:53:45.351Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-7732
Vulnerability from cvelistv5
Published
2019-02-11 17:00
Modified
2024-08-04 20:54
Severity ?
Summary
In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:54:28.417Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/rgaufman/live555/issues/20",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-02-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-11T17:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/rgaufman/live555/issues/20",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-7732",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/rgaufman/live555/issues/20",
                     refsource: "MISC",
                     url: "https://github.com/rgaufman/live555/issues/20",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-7732",
      datePublished: "2019-02-11T17:00:00",
      dateReserved: "2019-02-11T00:00:00",
      dateUpdated: "2024-08-04T20:54:28.417Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-6933
Vulnerability from cvelistv5
Published
2014-01-23 21:00
Modified
2024-08-06 17:53
Severity ?
Summary
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T17:53:45.948Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.live555.com/liveMedia/public/changelog.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-11-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2014-01-23T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.live555.com/liveMedia/public/changelog.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2013-6933",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 through 2013.11.25, as used in VideoLAN VLC Media Player, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or (2) tab character at the beginning of an RTSP message, which triggers an integer underflow, infinite loop, and buffer overflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.live555.com/liveMedia/public/changelog.txt",
                     refsource: "CONFIRM",
                     url: "http://www.live555.com/liveMedia/public/changelog.txt",
                  },
                  {
                     name: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
                     refsource: "MISC",
                     url: "http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2013-6933",
      datePublished: "2014-01-23T21:00:00",
      dateReserved: "2013-12-03T00:00:00",
      dateUpdated: "2024-08-06T17:53:45.948Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}